Easter Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Google-Workspace-Administrator Associate Google Workspace Administrator Questions and Answers

Questions 4

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

Options:

A.

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.

Enable Protect against unauthenticated emails in Gmail Safety.

D.

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Buy Now
Questions 5

Your organization recently deployed Google Workspace. Over 3,000 external contacts were shared in public folders in Microsoft Exchange before the implementation. You need to ensure that these external contacts appear to domain users in Gmail. What should you do?

Options:

A.

Export the external contacts to a CSV file, upload the file to Google Drive, and instruct users to import to their My Contacts.

B.

Use Google Cloud Directory Sync to sync the external contacts from the public folders in Microsoft Exchange to the Directory.

C.

Use the Domain Shared Contacts API to add the external contacts to the Directory.

D.

Create a user account, add the external contacts, and delegate them to all users in the domain.

Buy Now
Questions 6

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Buy Now
Questions 7

You need to grant a specific set of users in your company access to YouTube, and you want to restrict their access to Merchant Center. What should you do?

Options:

A.

Enable YouTube for all users in the company. Individually restrict access to Merchant Center for specific Groups or organizational units (OUs).

B.

Create YouTube and Merchant Center as custom web apps. Apply access policies at the Group or organizational unit (OU) level.

C.

Contact Google Support and request that they enable YouTube access for the specific set of users and restrict their access to Merchant Center.

D.

Enable access to YouTube at the Group or organizational unit (OU) level for the subset of users. Disable access to Merchant Center.

Buy Now
Questions 8

You are designing a group structure for your company that will be used to grant access to a specific shared drive. You need this solution to automatically add and remove employees based on their job role. What should you do?

Options:

A.

Create a security group. Add all employees with the desired job role. Grant the security group access to the shared drive.

B.

Create a distribution list. Add all employees with the desired job role. Grant the distribution list access to the shared drive.

C.

Create a dynamic group. Set the membership criteria to the desired job role. Grant the dynamic group access to the shared drive.

D.

Create a configuration group. Add users on an exception basis. Grant the configuration group access to the shared drive.

Buy Now
Questions 9

Your organization is about to conduct its biannual risk assessment. You need to help identify security risks by quickly reviewing all security settings for Gmail, Drive, and Calendar. What should you do?

Options:

A.

In the reporting section of the Admin console, review the Gmail, Drive, and Calendar reports.

B.

In the alert center, review all of the alerts.

C.

In each individual organizational unit (OU), review the security settings.

D.

In the Google Admin console, review the security health page.

Buy Now
Questions 10

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

Options:

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

Buy Now
Questions 11

A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?

Options:

A.

Purchase and assign Archived User licenses to the former employees.

B.

Transfer the former employees' files and data to active user accounts. Delete the former employees' Workspace accounts.

C.

Purchase additional user licenses and suspend the former employees' accounts.

D.

Move the former employees to their own organizational unit(OU) and disable access to Google services for that OU.

Buy Now
Questions 12

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

Options:

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Buy Now
Questions 13

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Options:

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Buy Now
Questions 14

You’ve received multiple reports about a suspicious email from someone who is pretending to be from your organization’s human resources department. The email is prompting employees to click a link for a password update. You want to remediate this sender’s emails. What should you do?

Options:

A.

Use the security investigation tool to search for users who received the suspicious email, and select Mark message as phishing.

B.

Use the security investigation tool to action the suspicious email and select Mark message as spam.

C.

Create an activity rule to alert administrators to similar emails from that sender.

D.

Notify all employees and request that they report this email as spam.

Buy Now
Questions 15

A new user at your organization is unable to access Google Meet. You have verified that the user’s account is active and the correct licenses are assigned. You need to resolve the access issue. What should you do?

Options:

A.

Check the user’s browser settings to ensure that Meet is not blocked.

B.

Instruct the user to clear their browser’s cache and cookies.

C.

Restart the user’s computer to refresh their network connection.

D.

Verify that Meet is enabled as a service for the user’s account in the Admin console.

Buy Now
Questions 16

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

Options:

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Buy Now
Questions 17

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

Options:

A.

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.

Upload the HAR file to Google Drive and share the file with the Google support representative.

Buy Now
Questions 18

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Options:

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Buy Now
Questions 19

Your organization needs an approval application for purchases where a user can enter information on the purchase required and then submit it for management approval. You need to suggest a solution to create the application that must be available on both the web and mobile devices. Your organization does not have software developers or the budget to hire a third party. What should you do?

Options:

A.

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

B.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

C.

Suggest the organization use AppSheet to create the application.

D.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

Buy Now
Questions 20

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.

What should you do?

Options:

A.

Export the resource list to a CSV file, make the changes, and re-import the updated file.

B.

Edit each resource in the Google Admin console.

C.

Add the modified rooms as new resources. Tell employees not to use old rooms.

D.

Delete the existing resources and recreate the resources with the updated information.

Buy Now
Questions 21

Your company’s help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?

Options:

A.

Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.

B.

Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).

C.

Turn off more aggressive spam filtering in spam policies that are applied to the users’ organizational unit and add the senders’ mail system IP addresses to the email allowlist.

D.

Create an address list of approved senders so messages from these users bypass Gmail’s spam filters and recipients can decide whether they are spam or not.

Buy Now
Exam Name: Associate Google Workspace Administrator
Last Update: Apr 22, 2025
Questions: 90

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now Google-Workspace-Administrator testing engine

PDF (Q&A)

$31.5  $104.99
buy now Google-Workspace-Administrator pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 22 Apr 2025