Free GOOGLE-WORKSPACE-ADMINISTRATOR Exam Braindumps (page: 11)

Page 11 of 31

The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.

What should you do?

  1. Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.
  2. Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.
  3. Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.

Answer(s): A

Explanation:

https://support.google.com/vault/answer/6161352?hl=en



Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

  1. Use the login audit report to export all suspicious login details for analysis.
  2. Create a custom dashboard with the security investigation tool showing suspicious logins.
  3. Use the account activity report to export all suspicious login details for analysis.
  4. Create a custom query in BigQuery showing all suspicious login details.

Answer(s): A

Explanation:

Login audit log Track user sign-in activity You can use the Login audit log to track user sign-ins to your domain. You can review all sign-ins from web browsers. If a user signs in from an email client or a non-browser application, you can only review reports of suspicious attempts. Forward log event data to the Google Cloud Platform You can opt in to share the log event data with Google Cloud Platform. If you turn on sharing, data is forwarded to Cloud Logging, where you can query and view your logs, and control how you route and store your logs https://support.google.com/a/answer/4580120?hl=en



In the years prior to your organization moving to Google Workspace, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on Google Workspace.) You were able to address active employees' use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account.

What should you do?

  1. Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-Google Workspace Google services and have them blocked.
  2. Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
  3. Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc.
    accounts, so they can clean up the respective access control lists.
  4. Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all Google Workspace and Other Google Services disabled.

Answer(s): B

Explanation:

https://support.google.com/a/answer/6178640?hl=en



Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information.

What should you do?

  1. Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
  2. Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
  3. Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
  4. Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

Answer(s): B


Reference:

https://auth0.com/docs/protocols/saml/saml-configuration/troubleshoot/auth0-as-sp https://support.google.com/a/answer/2463723?hl=en



Page 11 of 31



Post your Comments and Discuss Google GOOGLE-WORKSPACE-ADMINISTRATOR exam with other Community members:

Sohrab commented on September 14, 2024
Hello everyone, My name is Sohrab and I am preparing for this exam. If you guys have any tips to share it would be wonderful and a great help.
Anonymous
upvote

Abhilash commented on March 14, 2023
I have used other dump site before, but this one was by far the best and cheaper in price!
INDIA
upvote