Download the latest Google Workspace Administrator exam dumps for success Exam : Google Workspace Administrator Title : Professional Google Workspace Administrator https://www.passcert.com/Google-Workspace-Administrator.html 1/5 Download the latest Google Workspace Administrator exam dumps for success 1.Your company has numerous locations throughout the world. Each of these locations has multiple office managers that field questions from employees through an email alias. Some questions have not been answered by an office manager. How can you create a system to assign conversations to different receptionists using Workspace? A. Create a Google Groups Collaborative Inbox. B. Use App Script to design a ticketing system that marks conversation ownership. C. Contract with a third-party solution, such as ServiceNow. D. Create Google Tasks and assign them to receptionists to address unanswered questions. Answer: A 2.The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available. What should you do? A. Set up unmanaged Chromeboxes and set the executives’ homepage to meet.google.com via Chrome settings. B. Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars. C. Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives’ calendars. D. Provision managed Chromeboxes and set the executives’ Chrome homepage to meet. google.com via device policy. Answer: C Explanation: https://support.google.com/meethardware/answer/3341435?hl=en If the device is for a single user, such as in a home office or other remote location, you can associate the device with their personal calendar. Whenever an organizer adds that user to a Calendar event, the meeting name appears on their device. 3.You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no other users are experiencing issues signing in. What could be causing the sign-in issue? A. The SAML assertion provided by the third-party IDP is presenting a username that conflicts with the current username configured in Google Workspace. B. The user's Google password was changed administratively, which is causing a sign-in failure. C. The issued certificate for that user has been revoked and must be updated before the user can have another successful sign in. D. The SAML assertion is providing the user's previous password attached to their old username. Answer: A 4.You recently started an engagement with an organization that is also using Google Workspace. The 2/5 Download the latest Google Workspace Administrator exam dumps for success engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured. Which configuration should you implement? A. Turn on external sharing with whitelisted domains, and add the external organization to the whitelist. B. Provision accounts within your domain for the external users, and turn off external sharing for that Org. C. Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain. D. Create a Team Drive for this engagement, and limit the memberships and sharing settings. Answer: D Explanation: https://support.google.com/a/users/answer/9310352#1.1 5.Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request. What should you do? A. Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt. B. Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check “Encrypt message if not encrypted”. C. Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt. D. Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check “Change route” to send to your third-party encryption provider to encrypt. Answer: D Explanation: https://support.google.com/a/answer/3540538?hl=en 6.A user joined your organization and is reporting that every time they start their computer they are asked to sign in. This behavior differs from what other users within the organization experience. Others are prompted to sign in biweekly. What is the first step you should take to troubleshoot this issue for the individual user? A. Reset the user's sign-in cookies B. Confirm that this user has their employee ID populated as a sign-in challenge. C. Check the session length duration for the organizational unit the user is provisioned in. D. Verify that 2-Step Verification is enforced for this user. Answer: C 7.After making a recent migration to Google Workspace, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in Google Workspace. You need to resolve this issue. What should you do? A. Train users to use Google Workspace’s merge contacts feature. 3/5 Download the latest Google Workspace Administrator exam dumps for success B. Enable directory contact deduplication in the Google Workspace Admin panel. C. Update shared contact search rules to exclude internal users. D. Create a new global directory, and delete the original. Answer: C Explanation: https://support.google.com/a/answer/3075991#duplicatecontacts "To resolve this issue, correct your shared contact search rules to exclude users in your own domain. On the next sync, GCDS attempts to delete the redundant contacts. You might need to adjust the shared contact deletion limit for that first sync. 8.All Human Resources employees at your company are members of the “HR Department” Team Drive. The HR Director wants to enact a new policy to restrict access to the “Employee Compensation” subfolder stored on that Team Drive to a small subset of the team. What should you do? A. Use the Drive API to modify the permissions of the Employee Compensation subfolder. B. Use the Drive API to modify the permissions of the individual files contained within the subfolder. C. Move the contents of the subfolder to a new Team Drive with only the relevant team members. D. Move the subfolder to the HR Director's MyDrive and share it with the relevant team members. Answer: C Explanation: "Inherited permissions can't be removed from a file or folder in a shared drive". ref: https://developers.google.com/drive/api/v3/manage-sharing 9.Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named Google Workspace accounts (e.g., user1@your-company.com, user2@your-company.com, user3@your-company.com). The manager of this program wants all email to these accounts routed to the manager's mailbox account also. What should you do? A. Setup address forwarding in each account's GMail setting menu. B. Set up recipient address mapping in GMail Advanced Settings. C. Configure an Inbound Gateway route. D. Give the manager delegated access to the mailboxes. Answer: B Explanation: https://support.google.com/a/answer/6297084#address 10.Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail’s address autocomplete for all users in the domain. What are two options to meet this requirement? (Choose two.) A. Use the Directory API to upload a .csv file containing the contacts. B. Configure GCDS to populate a Group with external members. C. Use the People API to upload a .csv file containing the contacts. D. Develop a custom application to call the Domain Shared Contacts API. 4/5 Download the latest Google Workspace Administrator exam dumps for success E. Configure GCDS to synchronize shared contacts. Answer: D,E Explanation: https://support.google.com/a/answer/9281635?hl=en&ref_topic=20016 11.Your organization's information security team has asked you to determine and remediate if a user (user1@example.com) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately? A. Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is user1@example.com. B. Have the super administrator use the Security API to audit Drive access. C. As a super administrator, change the access on externally shared Drive files manually under user1@example.com. D. Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for user1@example.com. Answer: A Explanation: https://support.google.com/a/answer/11480192?hl=en&ref_topic=11479095#:~:text=View%20files%20sh ared,Click%20Search. 12.Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do? A. Assign the pre-built security admin role to the security team members. B. Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members. C. Assign the Super Admin Role to the security team members. D. Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members. Answer: B Explanation: https://support.google.com/a/answer/9043255#:~:text=To%20give%20access%20only%20to%20the%20 investigation%20tool%2C%20check%20the%20individual%20boxes%20for%C2%A0Investigation%20To ol%20privileges.%20You%20can%20add%20specific%20privileges%20for%20access%20to%20differen t%20types%20of%20data%20(for%20example%2C%20Gmail%2C%20Drive%2C%20Device%2C%20a nd%20User)%3A 5/5