A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business
data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
D
Explanation:
Reference: https://support.google.com/a/answer/175197?hl=en
You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to
Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half
the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have
external members. You need to update groups to be configured correctly.
What should you do?
A
Your client is a multinational company with a single email domain. The client has compliance requirements and policies that
vary by country. You need to configure the environment so that each country has their own administrator and no
administrator can manage another country.
What should you do?
B
In the years prior to your organization moving to G Suite, it was relatively common practice for users to create consumer
Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in
Docs with other partners who were on G Suite.) You were able to address active employees use of consumer accounts
during the rollout, and you are now concerned about blocking former employees who could potentially still have access to
those services even though they don't have access to their corporate email account.
What should you do?
C
Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for
two specific users. Additionally, they have been asked to discover and hold any email referencing Secret Project 123.
What steps should you take to satisfy this request?
B
Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an
external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party
cloud services. What two features are essential to reconfigure in G Suite? (Choose two.)
A C
Explanation:
Reference: https://support.google.com/a/answer/60224?hl=en
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite You
want to investigate using an audit log.
What log should you use?
D
Explanation:
Reference: https://support.google.com/a/answer/6124308?hl=en
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You
decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You
discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the
organizational unit of the device administrator.
What should you do?
A
A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft
emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between
hotels, vendor offices, and airport lounges.
You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from
happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's
busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required
troubleshooting inputs.
What two actions should be taken on this call with the user? (Choose two.)
C E
Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts.
When new employees are onboarded, a user object is created in Active Directory. They have determined that manually
creating the users in G Suite Admin Panel is timeconsuming and prone to error. You need to work with the client to identify a
method of creating new users that will reduce time and error.
What should you do?
A