πŸŽ„

CertoMetrics - 9% OFF Special Discount Offer - Ends In:

0d 00h 00m 00s
Coupon code: SALE2026

Google Cloud Certified - Associate Google Workspace Administrator (PR000299)

Get full access to the updated question bank and pass on your first attempt.

Vendor

Google

Certification

Google Associate certification

Content

224 Qs

Status

Verified

Updated

12 hours ago

Test the Practice Engine

Experience our real exam environment with free demo questions

Launch Free Demo
Best Value Bundle

Premium Bundle

Complete Success Suite

$83 $49

Save $34 Instantly

  • βœ“
    Full PDF + Interactive Engine Everything you need to pass
  • βœ“
    All Advanced Question Types Drag & Drop, Hotspots, Case Studies
  • βœ“
    Priority 24/7 Expert Support Direct line to certification leads
  • βœ“
    90 Days Free Priority Updates Stay current as exams change

Success Metric

98.4% Pass Rate

Verified by 15k+ Students
Secure Checkout
Popular

Standard Simulation

Practice Engine

$44

One-Time Payment

  • Web-Based (Zero Install)
  • Real Testing Environment Virtual & Practice Modes
  • Interactive Engine Drag & Drop, Hotspots
  • 60 Days Free Updates

Compatible with All Devices

Chrome
Verified Secure Checkout

Basic Tier

PDF Study Guide

$39

Digital Access

  • βœ“ Exam Questions (PDF)
  • βœ“ Mobile Friendly
  • βœ“ 60 Days Updates
Download Free Sample PDF

Verified 45-Question Preview (PR000299)

Secure Checkout

Verified Community

The CertoMetrics Standard.

Recommend the #1 platform for verified Google certification resources.

Success Network

Help a Colleague Succeed.

Invite a peer to get their own updated PR000299 prep kit.

Exam Overview

The Google Associate Google Workspace Administrator certification validates your proficiency in managing, configuring, and optimizing Google Workspace for an organization. Achieving this credential demonstrates your ability to administer users, services, security, and data management within the Google Workspace ecosystem, proving essential skills for modern cloud-based collaboration environments. This certification significantly enhances your professional credibility, showcasing expertise in maintaining a secure and efficient digital workplace. For IT professionals, it’s a strategic step to advance careers in cloud administration, ensuring organizations can maximize their investment in Google's powerful suite of productivity tools and fostering seamless communication and collaboration across teams.

Questions

50-60

Passing Score

700/1000

Duration

120 Minutes

Difficulty

Intermediate

Level

Associate

Skills Measured

Managing Users, Groups, and Organizational Units
Configuring and Managing Google Workspace Services
Implementing and Managing Security and Data Access
Planning and Implementing Data Migration and Infrastructure
Monitoring, Reporting, and Troubleshooting Google Workspace

Career Path

Target Roles

Google Workspace Administrator IT Administrator Cloud Administrator

Common Questions

Is the material up to date?

Yes. We update our question bank weekly to match the latest Google standards. You get free updates for 90 days.

What format do I get?

You get instant access to both the **PDF** (for reading) and our **Premium Test Engine** (for exam simulation).

Is there a guarantee?

Absolutely. If you fail the PR000299 exam using our materials, we offer a full money-back guarantee.

When do I get the download?

Instantly. The download link is available in your dashboard immediately after payment is confirmed.

Free Study Guide Samples

Previewing updated PR000299 bank (45 Questions).

QUESTION 1

You are a Workspace Administrator with a mix of Business Starter and Standard Licenses for your users. A Business Starter User in your domain mentions that they are running out of Drive Storage Quota. Without deleting data from Drive, what two actions can you take to alleviate the quota concerns for this user? (Choose two.)

A
Add other users as β€œEditors” on the Drive object, thus spreading the storage quota debt between all of them.
B
Manually export and back up the data locally, and delete the affected files from Drive to alleviate the debt.
C
Make another user the β€œOwner” of the Drive objects, thus transferring the storage quota debt to them.
D
Perform an API query for large storage drive objects, and delete them, thus alleviating the quota debt.
E
Move the affected items to a Shared Drive. Shared Drives transfer ownership of the drive item to the domain itself, which alleviates the quota debt from that user.

Correct Option: C,E

βœ… Option C (Correct) Reasoning: Transferring ownership of Drive objects to another user moves the storage quota consumption from the original user to the new owner. This alleviates the original user's quota debt without deleting any data.



βœ… Option E (Correct) Reasoning: Moving items to a Shared Drive transfers their ownership from individual users to the Shared Drive itself, which is owned by the organization. This frees up the individual user's quota without data deletion.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Adding editors does not transfer storage quota debt. Quota is consumed only by the file's owner.
  • Option B is incorrect: This action involves deleting files from Drive, which explicitly contradicts the "without deleting data" requirement.
  • Option D is incorrect: This action also involves deleting data, violating the specified constraint of the question.
QUESTION 2

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

A
Remove Google Workspace license to prevent users from accessing their accounts now.
B
Suspend users that the organization does not wish to have access.
C
Add the users to the OU with all services disabled.
D
Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Correct Option: C

βœ… Option C (Correct) Reasoning: Organizational Units (OUs) allow administrators to apply granular service settings to specific user groups. By moving the majority of users to an OU with all Workspace services disabled, their access is blocked without affecting the IT team or testers in another OU. This precisely meets the requirement for staged access.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Removing licenses would block access for all users, including the IT team and testers who need active access for configuration and testing.
  • Option B is incorrect: Suspending users is more drastic than simply disabling service access. It affects the entire user account and might interfere with IdP synchronization, whereas OU service control is more targeted.
  • Option D is incorrect: Context-Aware Access controls conditional access based on context (e.g., device, location). It's not designed to disable or enable services at a group level; OU service settings are the appropriate administrative tool for this scenario.


QUESTION 3

Your company has acquired a new company in Japan and wants to add all employees of the acquisition to your existing Google Workspace domain. The new company will retain its original domain for email addresses and, due to the very sensitive nature of its work, the new employees should not be visible in the global directory. However, they should be visible within each company's separate directory. What should you do to meet these requirements?

A
Create a new Google Workspace domain isolated from the existing one, and create users in the new domain instead.
B
Under Directory Settings > Contact sharing, disable the contact sharing option and wait for 24 hours to allow the settings to propagate before creating the new employee accounts.
C
Redesign your OU organization to have 2 child OUs for each company directly under the root. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the OU.
D
Create one dynamic group for each company based on a custom attribute defining the company. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the dynamic group.

Correct Option: C

βœ… Option C (Correct) Reasoning: Organizing users into OUs by company allows for precise control. Google Workspace custom directories enable defining visibility rules based on OUs, ensuring each company's employees are visible only within their specific directory and hidden from the global directory.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Creating a new, isolated domain contradicts the requirement to add employees to the existing Google Workspace domain.
  • Option B is incorrect: Disabling contact sharing entirely removes all directory visibility, preventing employees from being visible even within their own company's directory.
  • Option D is incorrect: While dynamic groups can manage visibility, OUs provide a more fundamental and robust hierarchical structure for applying broad management policies, including granular directory visibility settings, making C a more complete solution.
QUESTION 4

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

A
Reinstall Password Sync on all domain controllers.
B
Reauthorize the Password Sync tool in the Google Workspace Admin Console.
C
Confirm that the Password Sync service is running on all domain controllers.
D
Reset the user's password in Active Directory.

Correct Option: C

βœ… Option C (Correct) Reasoning: If the Password Sync service is not running on a domain controller, it cannot detect or transmit password changes from Active Directory to Google Workspace. Verifying the service status is the most fundamental and crucial first troubleshooting step when sync failures occur.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Reinstallation is a drastic measure, typically reserved for widespread, persistent issues or corruption, not a first step for a single user's sync problem.
  • Option B is incorrect: Reauthorizing the tool addresses token expiry or revoked access, which usually impacts all users. It's less likely the initial cause for a single user's missed sync before checking service status.
  • Option D is incorrect: Resetting the password might force a new sync if the service is already running, but it doesn't troubleshoot why the original change failed to sync. It bypasses the diagnostic process.


QUESTION 5

A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?

A
Use Security Investigation Tool to Search Google Drive events for all of the user's documents, and use Google Admin > Reports > Email Log Search to find their emails.
B
Search Google Drive for all of the user’s documents, and ask them to forward all of their emails.
C
Use the Gmail API and Google Drive API to automatically collect and export data.
D
Utilize Google Vault to hold, search, and export data of interest.

Correct Option: D

βœ… Option D (Correct) Reasoning: Google Vault is Google's eDiscovery and information governance solution. It is specifically designed to apply legal holds, perform comprehensive searches across Google Workspace data (including Gmail and Drive), and export data in defensible formats, which is essential for fulfilling legal investigation requests.

❌ Why the other choices are incorrect:

  • Option A is incorrect: The Security Investigation Tool primarily focuses on security events and logs, not comprehensive content retrieval for legal export. Email Log Search provides delivery logs, not the actual email content required for a legal investigation.
  • Option B is incorrect: Manually searching Drive is incomplete and asking the user to forward emails is unreliable, non-compliant, and entirely unprofessional for a legal request, risking data omission or manipulation.
  • Option C is incorrect: While technically possible, using APIs for data collection is a complex, custom development solution. It lacks the built-in legal hold, auditing, and defensibility features inherent in a dedicated eDiscovery tool like Google Vault.


QUESTION 6

You are in the middle of migrating email from on-premises Microsoft Exchange to Google Workspace. Users that you have already migrated are complaining of messages from internal users going into spam folders. What should you do to ensure that internal messages do not go into Gmail spam while blocking spoofing attempts?

A
Train users to click on Not Spam button for emails.
B
Add all users of your domain to an approved sender list.
C
Force TLS for your domain.
D
Ensure that your inbound gateway is configured with all of your Exchange server IP addresses.

Correct Option: D

βœ… Option D (Correct) Reasoning: Configuring an inbound gateway with your on-premises Exchange server IP addresses tells Google Workspace to trust mail originating from those servers, preventing legitimate internal emails from being flagged as spam or spoofing attempts by Google's filters during a hybrid migration.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Training users is reactive and does not address the underlying configuration issue causing legitimate mail to be marked as spam.
  • Option B is incorrect: There isn't a direct "approved sender list" for entire domains; inbound gateway configuration is the correct method for trusting internal sources. It also doesn't block external spoofing.
  • Option C is incorrect: Forcing TLS encrypts mail in transit but does not address the issue of internal mail being marked as spam based on its origin or block spoofing attempts based on sender identity.
QUESTION 7

Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?

A
Modify your Marketplace Settings to block users from installing any app from the Marketplace.
B
Set all API services to β€œrestricted access” and ensure that all connected apps have limited access.
C
Remove all client IDs and scopes from the list of domain-wide delegation API clients.
D
Block each connected app's access.

Correct Option: C

βœ… Option C (Correct) Reasoning: Removing client IDs and scopes from domain-wide delegation immediately revokes API access for applications, including many add-ons, that exploit this high-privilege method to access Workspace data without individual user consent. This directly addresses cutting off add-on access immediately and implicitly blocks future unauthorized domain-wide delegated apps while preserving user sign-in (SSO) for third-party sites.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Modifying Marketplace settings only prevents new user installations from the Marketplace. It does not revoke access for already installed add-ons or prevent non-Marketplace/domain-wide delegated apps from accessing data.
  • Option B is incorrect: Setting all API services to "restricted access" is an overly broad action. It would severely disrupt many legitimate Workspace functions and approved third-party sign-ins (SSO), which the scenario explicitly approves.
  • Option D is incorrect: Blocking each connected app's access individually is a manual, time-consuming process. It does not provide the immediate, global cut-off of all add-ons access required by the scenario.
QUESTION 8

As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore from one satellite office and that they receive an error message that β€œa company policy is blocking access to this app.” The users have no issue with Gmail or Google Calendar. While investigating, you learn that both this office's Internet Service Provider (ISP) and the global IP address when accessing the internet were changed over the weekend. What is the most logical reason for this issue?

A
An access level was defined based on the IP range and applied to Google Drive via Context-Aware Access.
B
Under Drive and Docs > Sharing Settings, the β€œWhitelisted domains” list needs to be updated to add the new ISP domain.
C
The Network Mask defined in Security > Settings > SSO with 3rd Party IdPs should be updated to reflect the new IP range.
D
You need to raise a ticket to Google Cloud Support to have your new IP ranges registered for Drive API access.

Correct Option: A

βœ… Option A (Correct) Reasoning: Context-Aware Access (CAA) allows administrators to define access levels based on IP ranges and apply them to specific apps like Google Drive. When the satellite office's IP address changed, their access no longer matched the defined CAA policy, causing the "company policy" error for Drive, while other services remained unaffected.

❌ Why the other choices are incorrect:

  • Option B is incorrect: "Whitelisted domains" in Drive and Docs sharing settings manage external sharing permissions, not internal user access to the Drive application itself. This would not cause a block for users trying to access Drive.
  • Option C is incorrect: The Network Mask for SSO with 3rd Party IdPs is related to authentication origin. Since users can access Gmail and Calendar, the SSO configuration is likely functioning, and this setting wouldn't selectively block Drive.
  • Option D is incorrect: Registering IP ranges for Drive API access pertains to programmatic API usage by applications, not direct end-user access to Google Drive through web browsers or client applications.


QUESTION 9

An end user informs you that they are having issues receiving mail from a specific sender that is external to your organization. You believe the issue may be caused by the external entity’s SPF record being incorrectly configured. Which troubleshooting step allows you to examine the full message headers for the offending message to determine why the messages are not being delivered?

A
Use the Postmaster Tools API to pull the message headers.
B
Use the Email Log Search to directly review the message headers.
C
Use the Security Investigation Tool to review the message headers.
D
Perform an SPF record check on the domain to determine whether their SPF record is valid.

Correct Option: C

βœ… Option C (Correct) Reasoning: The Security Investigation Tool in the Google Admin console allows administrators to search for specific email messages and view their full original headers. These headers include critical authentication details like SPF, DKIM, and DMARC results, which are essential for diagnosing delivery issues caused by misconfigured external sender records.

❌ Why the other choices are incorrect:

  • Option A is incorrect: Postmaster Tools provides aggregated data on sender reputation and delivery rates to Gmail, not individual message headers for incoming emails to an organization.
  • Option B is incorrect: While the Email Log Search tracks messages, it typically does not expose the full, raw message headers needed for deep authentication troubleshooting directly within its interface.
  • Option D is incorrect: Performing an SPF record check confirms the record's validity. However, it does not provide the specific message headers or Google Workspace's authentication results for a particular failing email.
QUESTION 10

Your company’s Google Workspace primary domain is β€œmycompany.com,” and it has acquired a startup that is using another cloud provider with a domain named β€œmystartup.com.” You plan to add all employees from the startup to your Google Workspace domain while preserving their current mail addresses. The startup CEO's email address is andrea@mystartup.com, which also matches your company CEO's email address as andrea@mycompany.com, even though they are different people. Each must keep the usage of their email. In addition, your manager asked to have all existing security policies applied for the new employees without any duplication. What should you do to implement the migration?

A
Create a secondary domain, mystartup.com, within your current Google Workspace domain, set up necessary DNS records, and create all startup employees with the secondary domain as their primary email addresses.
B
Create an alias domain, mystartup.com, in your existing Google Workspace domain, set up necessary DNS records, and create all startup employees with the alias domain as their primary email addresses.
C
Create a new Google Workspace domain with β€œmystartup.com,” and create a trust between both domains for reusing the same security policies and sharing employee information within the companies.
D
Create the startup employees in the β€œmycompany.com’ domain, and add a number at the end of the user name whenever there is a conflict. In Gmail > Routing, define a specific route for the OU that targets the startup employees, which will modify the email address domain to β€œmystartup.com,” and remove any numbers previously added. In addition, confirm that the SPF and DKIM records are properly set.

Correct Option: A

βœ… Option A (Correct) Reasoning: Creating a secondary domain allows distinct user accounts (e.g., andrea@mystartup.com and andrea@mycompany.com) within the same Google Workspace instance. This preserves original email addresses for the new employees and permits applying existing security policies without duplication by assigning users to appropriate Organizational Units (OUs).

❌ Why the other choices are incorrect:

  • Option B is incorrect: An alias domain maps to existing users; it doesn't allow creating separate accounts for identical usernames across different domains, violating the "different people" requirement. Users cannot have an alias domain as their primary email.
  • Option C is incorrect: Creating a new Google Workspace instance complicates policy application and sharing; Google Workspace lacks native cross-domain trust for policy synchronization. This violates the "without duplication" requirement.
  • Option D is incorrect: Creating users in mycompany.com or adding numbers violates preserving original startup email addresses. Gmail routing is a complex workaround, not a primary identity solution.
QUESTION 11

Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as β€œview data for all teams” to the HR group, but it is reporting an error when accessing the application. What should you do?

A
Allocate the β€œview data for all teams” permission to all employees of the company.
B
Confirm that the Work Insights app is turned ON for all employees.
C
Confirm in Security > API controls > App Access Controls that Work Insights API is set to β€œunrestricted.”
D
Confirm in Reports > BigQuery Export that the job is enabled.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 12

A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?

A
Download and attach the documents to a Gmail message, and send them to the external vendor.
B
Move all users from the finance org unit to the HR org unit.
C
Enable β€˜Visitor Sharing’ for the entire finance org unit.
D
Create a group with the finance and HR users who need to share externally.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 13

You have been asked to support an investigation that your litigation team is conducting. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user's awareness. What two actions should you take? (Choose two.)

A
Move the user to their own Organization Unit, and set a custom retention policy.
B
Create a hold on the user's mailbox in Google Vault.
C
Reset the user's password, and share the new password with the litigation team.
D
Copy the user's data to a secondary account.
E
Create a matter using Google Vault, and share the matter with the litigation team members.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 14

Your sales team, which is organized as its own organizational unit, is prone to receiving malicious attachments. What action should you take, as an administrator, to apply an additional layer of protection in the admin console for your sales team without disrupting business operation?

A
Configure an attachment compliance rule to send any emails with attachments received by users within the sales team organizational unit to an administrator quarantine.
B
Configure an attachment compliance rule to strip any attachments received by users within the sales team organizational unit.
C
Configure the security sandbox feature on the sales team organizational unit.
D
Update the Email Allowlist in the admin console to only include IP addresses of known senders.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 15

Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?

A
Create a configuration group with the approved users as members, and use it to create a target audience.
B
Enable external sharing for the marketing and sales organizational units.
C
Enable external sharing only to allowlisted domains provided by marketing and sales teams.
D
Create a configuration group with the approved users as members, and enable external sharing for this group.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 16

As a Workspace Administrator, you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

A
Download the company owned inventory template CSV file from the admin panel, enter the serial number of the devices, and upload it back to the company owned inventory in the admin panel.
B
Download the company owned inventory template CSV file from the admin panel, enter the Device OS, serial number and upload it back to the company owned inventory in the admin panel.
C
Download the company owned inventory template CSV file from the admin panel, enter the asset tag of the devices, and upload it back to the company owned inventory in the admin panel.
D
Download the company owned inventory template CSV file from the admin panel, enter the Device OS, asset tag and upload it back to the company owned inventory in the admin panel.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 17

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?

A
Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > β€œExport HAR”
B
Admin.google.com > Reporting > Reports > Apps Reports > Gmail
C
chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com
D
Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 18

Your organization is about to expand by acquiring two companies, both of which are using Google Workspace. The CISO has mandated that strict β€˜No external content sharing’ policies must be in place and followed. How should you securely configure sharing policies to satisfy both the CISO’s mandate while allowing external sharing with the newly acquired companies?

A
Allow external sharing of Drive content for the IT group only.
B
Create a Drive DLP policy that will allow sharing to only domains on an allowlist.
C
Use shared drives to store the content, and share only individual files externally.
D
Let users share files between the two companies by using the β€˜Trusted Domains’ feature. Create an allowlist of the trusted domains, and choose sharing settings for the users.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 19

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?

A
Delete the user's account in the Admin Console.
B
Transfer data between end user Workspace accounts.
C
Instruct a Google Vault admin to create a matter, and place all the user data on β€˜hold.’
D
Use Google Vault to export all the user data and share among the security team.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 20

Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)

A
Provide your current GCDS instance with admin credentials to the recently acquired organization's LDAP directory.
B
Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.
C
Set up exclusion rules to ensure that users synced from the acquired organization's LDAP are not, suspended.
D
Set up an additional instance of GCDS running on another server, and handle the acquired organization's synchronization.
E
Upgrade to the multiple LDAP version of GCDS.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 21

Your IT team is being asked to fulfill a query by your organization's legal department that requires an MBOX file that will be shared to a third-party partner for eDiscovery. The query must be run on multiple users. Legal has no admin rights to Google Vault. What should you do to fulfil the request?

A
Create a Google Vault matter for each user account, and share the matters to the legal admin.
B
Create a Google Vault matter, search for data, and run an export for the legal department.
C
Use the Investigation Too! to search for the data requested, and export for the legal department.
D
Search for the data in Gmail, and export for the legal department.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 22

You received this email from the head of marketing:

Hello Workspace Admin:

Next week, a new consultant will be starting on the β€œmassive marketing mailing” project. We want to ensure that they can view contact details of the rest of the marketing team, but they should not have access to view contact details of anyone else here at our company. Is this something that you can help with?

What are two of the steps you need to perform to fulfill this request? (Choose two.)

A
Create an isolated OU for the consultants who need the restricted contacts access.
B
Create a group that includes the contacts that the consultant is allowed to view.
C
Apply the role of owner to the consultant in the group settings.
D
Create the consultant inside under the marketing OU.
E
Ensure that you have the Administrator Privilege of Services > Services settings and that Services >Contacts > Contacts Settings Message is set.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 23

You are in charge of automating and configuring Google Cloud Directory Sync for your organization. Within the config manager, how can you proactively prevent applying widespread deletions within your Workspace environment if your company’s LDAP undergoes a substantial modification?

A
Manually run Google Cloud Directory Sync only after performing a simulated sync.
B
Specify the minimum and maximum number of objects to synchronize in each configuration item.
C
Configure the tool to delete users only when run from the config manager.
D
Configure limits for the maximum number of deletions on each synchronization.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 24

You act as the Google Workspace Administrator for a company that has just acquired another organization. The acquired company will be migrated into your Workspace environment in 6 months. Management has asked you to ensure that the Google Workspace users you currently manage can efficiently access rich contact information in Workspace for all users. This needs to occur before the migration, and optimally without additional expenditure. What step do you take to populate contact information for all users?

A
Bulk-upload the contact information for these users via CSV into the Google Directory.
B
Use the Domain Shared Contacts API to upload contact information for the acquired company's users.
C
Provision and license Google Workspace accounts for the acquired company's users because they will need accounts in the future.
D
Prepare an uploadable file to be distributed to your end users that allows them to add the acquired company’s user contact information to their personal contacts.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 25

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?

A
Assign the β€˜Services Admin’ role to an administrator with β€˜Super Admin’ privileges.
B
Create a β€˜Custom Role’ and add all the Google Vault privileges for a new administrator.
C
Validate that the new administrator has access to Google Vault.
D
Create a β€˜Custom Role’ and add the ability to manage Google Vault matters, holds, searches, and exports.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 26

Your organization uses a third-party product to filter mail before it arrives at your Workspace Domain. How should you configure Gmail to ensure that inbound messages are not seen as a spam attack due to the volume of mail being received from this product?

A
Add the product's IP addresses as an approved sender.
B
Allowlist the IP addresses of the third-party filtering product.
C
Add the product's IP addresses to your organization's SPF record.
D
List the IP addresses of the product as an Inbound Gateway.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 27

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add, edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?

A
Set up the shared drive, and add the users as Content Managers of the drive.
B
Set up the shared drive, and add the users as editors of the drive.
C
Set up the shared drive, and add the users as Contributors of the drive.
D
Set up the shared drive, and add the users as Managers of the drive.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 28

You have configured Secure Transport (TLS) Compliance for all messages coming to and from an external domain, altostrat.com, that your end users communicate with via Gmail. What will your end users experience when messages are delivered to them from altostrat.com without TLS enabled?

A
The message will be delivered to their spam folder.
B
The message will not be delivered to the end user in any form.
C
The user will receive a failure message informing them that the message could not be delivered to their inbox and that they will need to work with their Workspace administrator to resolve the issue.
D
A warning banner will appear on the message informing the user that the message was not sent securely.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 29

As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages – whether spam, not spam, or phishing – for a specific time period. How do you find this information?

A
Open Admin Console > Security > Dashboard > User Reports.
B
Open Admin Console > Security > Dashboard > Spam Filter- Phishing.
C
Use Reports API to query user Gmail activity.
D
Open Admin Console > Reporting > Email Log Search.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 30

Your default Vault retention policy for Gmail is set to 365 days. Your legal department has just informed you that emails sent and received by the customer support department are sensitive, and must be retained for only 30 days. You must enforce this new retention policy in the simplest way. What should you do?

A
Change the current default retention policy for Gmail to 30 days. Configure two custom retention policies in Vault: one for 30 days that is applied to the customer support organizational unit (OU), and one for 365 days that is applied to all other OUS in your directory.
B
Change the current default retention policy in Vault for Gmail to 30 days, and apply it to the customer support organizational unit (OU). Configure a custom retention policy for Gmail for 365 days for your domain.
C
Create two custom retention policies in Vault: one for 30 days that is applied to the customer support organizational unit (OU), and one for 365 days that is applied to all other OUS in your directory.
D
Create a custom retention policy in Vault for Gmail for 30 days, and apply it to the customer support organizational unit (OU).

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 31

A user has reported that they did not receive an email from one of their normal correspondents. What information do you need to collect from the user to investigate the cause of the issue?

A
The email address of the sender and the subject and date/time of the missing message.
B
The type of device the individual is using, including the OS version, browser, and browser version.
C
The sender's domain so you can review their SPF and DKIM configuration.
D
The sender's IP address, mail client, and mail platform.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 32

An employee at your company does not need access to their Workspace account while they are on leave for a year. When they return, you need to ensure they have access to their account and that all their data and current emails remain intact. Also, their shared documents must be available to other users. You must accomplish this goal in the most cost-effective way. What should you do?

A
Delete the user after copying their emails and reassigning their documents to their manager.
B
Assign an Archive User license.
C
Suspend their account in the Admin console.
D
Remove the user license in the Admin console.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 33

Your organization is moving from a legacy mail system to Google Workspace. This move will happen in phases. During the first phase, some of the users in the domain are set up to use a different identity provider (IdP) for logging in. You need to set up multiple IdPs for various users. What should you do?

A
Enable single sign-on (SSO) with third-party identity providers and exclude the users who are using a different provider.
B
Enable single sign-on (SSO) with Cloud Identity, and use Cloud Directory Sync to manage multiple identity providers.
C
Create Security Assertion Markup Language (SAML) based single sign-on (SSO) profiles and assign them to specific organizational units or groups of users.
D
Nothing. Google uses cookies to establish a user's relationship to a device. This will cover multiple identity providers.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 34

You work at a large global holding firm with multiple companies that are united under one Google Workspace deployment. You must ensure that employees can only access documents at the company in which they are employed. What should you do?

A
Set up data loss prevention (DLP) rules to prevent specific documents from being shared.
B
Create a User group for each company and change Google Drive sharing settings to block external sharing.
C
Create an organizational unit (OU) for each company and disable file sharing.
D
Set up Google Drive trust rules to prevent access to documents from individual companies.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 35

An employee at your organization is experiencing video call issues in Google Meet, and they were unable to resolve the issues by themselves.

You need to troubleshoot the issue. What should you do first?

A
View the Meet quality report of the employee.
B
Ask your network administrator to add the dedicated Meet IP address range for your users.
C
Check the Meet settings of the employee.
D
Restart the device of the employee.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 36

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching. In preparation for the risk assessment, you want to quickly review all the security-related settings for Gmail, Drive, and Calendar, and identify the ones that may be posing risk. What should you do?

A
Review the Security health page in the Admin console.
B
Review all the alerts in the Alert center.
C
Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings for Workspace apps.
D
Review the Gmail, Drive, and Calendar reports in the Reporting section in the Admin console.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 37

The compliance team at your organization is conducting a legal investigation into some concerning sales activities of an employee eight months ago. The compliance team contacted you for assistance on the situation. You set up the default Google Vault retention rules so all data is retained only for one year. You must assist the compliance team with the investigation. What should you do?

A
Assign the compliance team a Google Vault administrator role and change the default retention rules to three years.
B
Suspend the employee and export all data by using Google Takeout.
C
Assign the compliance team a Google Vault administrator role and create a legal hold for the employee.
D
Do nothing. The retention period has already ended and the evidence has already been purged.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 38

Your organization has a group of users who interact with sensitive information and their accounts contain valuable files. You need to protect these users from targeted online attacks. What should you do?

A
Enable 2-Step Verification for those users and recommend they use Google Authenticator.
B
Enable 2-Step Verification for those users and recommend they use SMS codes.
C
Disable password recovery for end users.
D
Enroll all accounts for those users in the Advanced Protection Program.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 39

An employee has been leaking confidential salary information to an external party. You must use Vault to preserve the messages for an investigation. What should you do?

A
Create a matter and add a hold on the employee's email.
B
Use the search and export features to find all the messages sent externally.
C
Use the security investigation tool to find the messages. Create a hold to preserve the messages.
D
Create a custom retention policy. Use the audit feature to view captured email logs.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 40

Your organization has a strict requirement that your temporary employees can only send emails to and receive emails from specific external domains. You must define a policy in Google Workspace that meets this requirement for users in the temporary employee organizational unit (OU). What should you do?

A
Restrict sending and receiving to Google Groups, and carefully curate the temporary employees' memberships.
B
Configure the restrict delivery setting to limit domains that the temporary employees can communicate with. Allow Google Docs sharing notifications.
C
Add the allowed domains when configuring the restrict delivery setting in Gmail settings, and select the box to bypass for internal emails.
D
Create a policy in Gmail settings that rewrites the recipient for outbound messages and quarantines incoming messages to review before delivery

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 41

Your organization is working on a confidential project with details that cannot be shared through email with anyone outside your organization. You want to add controls in Gmail that prevent any mention of the project from being sent by employees. Only the CEO and the CFO can send information about the project over email and without a delay. What should you do?

A
Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project. Bypass the rule by using the address list with the CEO and CFO email addresses.
B
Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project. Manually review all quarantined emails and choose to deliver the ones sent by the CEO and CFO.
C
Configure the Gmail Restrict delivery setting for all outgoing messages, except the internal emails. Add the CEO and CFO email addresses to the allowlist.
D
Configure the Gmail Restrict delivery setting, and add an allowlist with all domains that your employees are allowed to send emails to. Include the CEO and CFO email addresses to the allowlist.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 42

The helpdesk at your organization reports that many users in multiple locations are not able to access Gmail, but can access other Workspace services. You must troubleshoot the issue. What should you do first?

A
Check network connectivity of the affected users.
B
Check the Google Workspace status dashboard to see whether there is a disruption in Gmail service availability.
C
Open a ticket with Google Support listing the affected users.
D
Check the Google Workspace release calendar to ensure there's not a Gmail upgrade scheduled.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 43

An employee at your organization is resigning. They are in charge of organizing and maintaining recurring team events. You want to preserve the existing meetings and transfer ownership to the resigning employee's manager. What should you do?

A
Transfer both the events and the resources owned by the resigning employee to their manager by using the Admin console.
B
Delete the existing calendar events and instruct the manager to create new events as the owner.
C
Assign an Archived User (AU) license for the resigning employee.
D
Instruct the resigning employee to share free/busy details for their calendar with their manager.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 44

Your organization has confidential internal content for which only authorized employees are allowed to access. Access to this content is managed by using Google Groups. Only administrators can create and manage membership. You need to provide only the necessary functionality and follow the principle of least privilege. What should you do?

A
Make a moderated group so all incoming communications can be monitored.
B
Make a security group to apply access policies.
C
Make a dynamic group so security team members are automatically added.
D
Use a group as a collaborative inbox that allows easier sharing.

Premium Solution Locked

Unlock all 224 answers & explanations

QUESTION 45

By using Account Activity reports, you have flagged several users who are uploading large files. You want to ensure you don't run out of pooled storage and you want to stop the abuse. What should you do first?

A
Use the Security Investigation Tool to set alerts on the flagged users.
B
Place the flagged users in a configuration group and set storage limits for the group.
C
Email flagged users with a warning of possible abuse.
D
Warn the flagged users, and purchase more pooled storage to avoid hitting storage quotas.

Premium Solution Locked

Unlock all 224 answers & explanations

Full Question Bank Locked

You have reached the end of the free study guide preview. Upgrade now to unlock all 224 questions and the full simulation engine.

Customer Reviews

5 / 5
(15,000+ verified)
5
100%
4
0%
3
0%
2
0%
1
0%

Global Community Feedback

DM

David M.

Verified Student

"The practice engine is incredible. It feels exactly like the real testing environment and helped me build so much confidence."

SJ

Sarah J.

Premium Member

"The PDF is very well organized and the explanations for the answers are actually helpful, not just random text."

MC

Michael C.

Verified Buyer

"I was skeptical, but the content is high quality and definitely worth the price. I passed on my first try!"

Need Assistance?

Our expert support team is available to assist you with any inquiries about our exam materials.

Contact Support
Average response: < 24 Hours

Get Exam Updates

Subscribe to receive instant notifications on new questions and exclusive flash sales.

* Join 5,000+ students getting weekly updates

Support Chat ● Active Now

πŸ‘‹ Hi! How can we help you pass your exam?

Enter email to start chatting