Free GOOGLE-WORKSPACE-ADMINISTRATOR Exam Braindumps (page: 14)

Page 13 of 31

The application development team has come to you requesting that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app.

What should you do?

  1. Enable all API access for Google Drive.
  2. Enable "trust domain owned apps" setting.
  3. Add OAuth Client ID to Google Drive Trusted List.
  4. Whitelist the app in the Google Workspace Marketplace.

Answer(s): C



Several customers have reported receiving fake collection notices from your company. The emails were received from accounts.receivable@yourcompany.com, which is the valid address used by your accounting department for such matters, but the email audit log does not show the emails in question. You need to stop these emails from being sent.

What two actions should you take? (Choose two.)

  1. Change the password for suspected compromised account accounts.receivable@yourcompany.com.
  2. Configure a Sender Policy Framework (SPF) record for your domain.
  3. Configure Domain Keys Identified Mail (DKIM) to authenticate email.
  4. Disable mail delegation for the accounts.receivable@yourcompany.com account.
  5. Disable "Allow users to automatically forward incoming email to another address."

Answer(s): B,C

Explanation:

https://support.google.com/a/answer/33786?hl=en https://support.google.com/a/answer/174124?hl=en



Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request.

What should you do?

  1. Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
  2. Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
  3. Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
  4. Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.

Answer(s): D

Explanation:

https://support.google.com/a/answer/3540538?hl=en



Your organization is concerned with the increasing threat of phishing attacks that may impact users.

Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

  1. Enable Enforce Strong Password policy.
  2. Enable Employee ID Login Challenge.
  3. Decrease the Maximum User Session Length.
  4. Revoke token authorizations to external applications.

Answer(s): B

Explanation:

You can use employee IDs as a login challenge. Employee IDs are more difficult to guess and phish than other types of identity challenges. To use the employee ID login challenge, you need to make sure that IDs are associated with your users' accounts.
https://support.google.com/a/answer/6002699?hl=en






Post your Comments and Discuss Google GOOGLE-WORKSPACE-ADMINISTRATOR exam with other Community members:

GOOGLE-WORKSPACE-ADMINISTRATOR Discussions & Posts