Google Cloud Certified - Associate Google Workspace Administrator (PR000299)
Get full access to the updated question bank and pass on your first attempt.
Vendor
Certification
Google Associate certification
Content
224 Qs
Status
Verified
Updated
12 hours ago
Test the Practice Engine
Experience our real exam environment with free demo questions
Premium Bundle
Complete Success Suite
Save $34 Instantly
-
βFull PDF + Interactive Engine Everything you need to pass
-
βAll Advanced Question Types Drag & Drop, Hotspots, Case Studies
-
βPriority 24/7 Expert Support Direct line to certification leads
-
β90 Days Free Priority Updates Stay current as exams change
Success Metric
98.4% Pass Rate
Standard Simulation
Practice Engine
One-Time Payment
-
Web-Based (Zero Install)
-
Real Testing Environment Virtual & Practice Modes
-
Interactive Engine Drag & Drop, Hotspots
-
60 Days Free Updates
Compatible with All Devices
Basic Tier
PDF Study Guide
Digital Access
- β Exam Questions (PDF)
- β Mobile Friendly
- β 60 Days Updates
Verified 45-Question Preview (PR000299)
Verified Community
The CertoMetrics Standard.
Recommend the #1 platform for verified Google certification resources.
Success Network
Help a Colleague Succeed.
Invite a peer to get their own updated PR000299 prep kit.
Exam Overview
The Google Associate Google Workspace Administrator certification validates your proficiency in managing, configuring, and optimizing Google Workspace for an organization. Achieving this credential demonstrates your ability to administer users, services, security, and data management within the Google Workspace ecosystem, proving essential skills for modern cloud-based collaboration environments. This certification significantly enhances your professional credibility, showcasing expertise in maintaining a secure and efficient digital workplace. For IT professionals, itβs a strategic step to advance careers in cloud administration, ensuring organizations can maximize their investment in Google's powerful suite of productivity tools and fostering seamless communication and collaboration across teams.
Questions
50-60
Passing Score
700/1000
Duration
120 Minutes
Difficulty
Intermediate
Level
Associate
Skills Measured
Career Path
Target Roles
Common Questions
Is the material up to date?
Yes. We update our question bank weekly to match the latest Google standards. You get free updates for 90 days.
What format do I get?
You get instant access to both the **PDF** (for reading) and our **Premium Test Engine** (for exam simulation).
Is there a guarantee?
Absolutely. If you fail the PR000299 exam using our materials, we offer a full money-back guarantee.
When do I get the download?
Instantly. The download link is available in your dashboard immediately after payment is confirmed.
Free Study Guide Samples
Previewing updated PR000299 bank (45 Questions).
You are a Workspace Administrator with a mix of Business Starter and Standard Licenses for your users. A Business Starter User in your domain mentions that they are running out of Drive Storage Quota. Without deleting data from Drive, what two actions can you take to alleviate the quota concerns for this user? (Choose two.)
Correct Option: C,E
β Option C (Correct) Reasoning: Transferring ownership of Drive objects to another user moves the storage quota consumption from the original user to the new owner. This alleviates the original user's quota debt without deleting any data.
β Option E (Correct) Reasoning: Moving items to a Shared Drive transfers their ownership from individual users to the Shared Drive itself, which is owned by the organization. This frees up the individual user's quota without data deletion.
β Why the other choices are incorrect:
- Option A is incorrect: Adding editors does not transfer storage quota debt. Quota is consumed only by the file's owner.
- Option B is incorrect: This action involves deleting files from Drive, which explicitly contradicts the "without deleting data" requirement.
- Option D is incorrect: This action also involves deleting data, violating the specified constraint of the question.
Your organization is preparing to deploy Workspace and will continue using your companyβs existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each userβs account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?
Correct Option: C
β Option C (Correct) Reasoning: Organizational Units (OUs) allow administrators to apply granular service settings to specific user groups. By moving the majority of users to an OU with all Workspace services disabled, their access is blocked without affecting the IT team or testers in another OU. This precisely meets the requirement for staged access.
β Why the other choices are incorrect:
- Option A is incorrect: Removing licenses would block access for all users, including the IT team and testers who need active access for configuration and testing.
- Option B is incorrect: Suspending users is more drastic than simply disabling service access. It affects the entire user account and might interfere with IdP synchronization, whereas OU service control is more targeted.
- Option D is incorrect: Context-Aware Access controls conditional access based on context (e.g., device, location). It's not designed to disable or enable services at a group level; OU service settings are the appropriate administrative tool for this scenario.
Your company has acquired a new company in Japan and wants to add all employees of the acquisition to your existing Google Workspace domain. The new company will retain its original domain for email addresses and, due to the very sensitive nature of its work, the new employees should not be visible in the global directory. However, they should be visible within each company's separate directory. What should you do to meet these requirements?
Correct Option: C
β Option C (Correct) Reasoning: Organizing users into OUs by company allows for precise control. Google Workspace custom directories enable defining visibility rules based on OUs, ensuring each company's employees are visible only within their specific directory and hidden from the global directory.
β Why the other choices are incorrect:
- Option A is incorrect: Creating a new, isolated domain contradicts the requirement to add employees to the existing Google Workspace domain.
- Option B is incorrect: Disabling contact sharing entirely removes all directory visibility, preventing employees from being visible even within their own company's directory.
- Option D is incorrect: While dynamic groups can manage visibility, OUs provide a more fundamental and robust hierarchical structure for applying broad management policies, including granular directory visibility settings, making C a more complete solution.
Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?
Correct Option: C
β Option C (Correct) Reasoning: If the Password Sync service is not running on a domain controller, it cannot detect or transmit password changes from Active Directory to Google Workspace. Verifying the service status is the most fundamental and crucial first troubleshooting step when sync failures occur.
β Why the other choices are incorrect:
- Option A is incorrect: Reinstallation is a drastic measure, typically reserved for widespread, persistent issues or corruption, not a first step for a single user's sync problem.
- Option B is incorrect: Reauthorizing the tool addresses token expiry or revoked access, which usually impacts all users. It's less likely the initial cause for a single user's missed sync before checking service status.
- Option D is incorrect: Resetting the password might force a new sync if the service is already running, but it doesn't troubleshoot why the original change failed to sync. It bypasses the diagnostic process.
A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?
Correct Option: D
β Option D (Correct) Reasoning: Google Vault is Google's eDiscovery and information governance solution. It is specifically designed to apply legal holds, perform comprehensive searches across Google Workspace data (including Gmail and Drive), and export data in defensible formats, which is essential for fulfilling legal investigation requests.
β Why the other choices are incorrect:
- Option A is incorrect: The Security Investigation Tool primarily focuses on security events and logs, not comprehensive content retrieval for legal export. Email Log Search provides delivery logs, not the actual email content required for a legal investigation.
- Option B is incorrect: Manually searching Drive is incomplete and asking the user to forward emails is unreliable, non-compliant, and entirely unprofessional for a legal request, risking data omission or manipulation.
- Option C is incorrect: While technically possible, using APIs for data collection is a complex, custom development solution. It lacks the built-in legal hold, auditing, and defensibility features inherent in a dedicated eDiscovery tool like Google Vault.
You are in the middle of migrating email from on-premises Microsoft Exchange to Google Workspace. Users that you have already migrated are complaining of messages from internal users going into spam folders. What should you do to ensure that internal messages do not go into Gmail spam while blocking spoofing attempts?
Correct Option: D
β Option D (Correct) Reasoning: Configuring an inbound gateway with your on-premises Exchange server IP addresses tells Google Workspace to trust mail originating from those servers, preventing legitimate internal emails from being flagged as spam or spoofing attempts by Google's filters during a hybrid migration.
β Why the other choices are incorrect:
- Option A is incorrect: Training users is reactive and does not address the underlying configuration issue causing legitimate mail to be marked as spam.
- Option B is incorrect: There isn't a direct "approved sender list" for entire domains; inbound gateway configuration is the correct method for trusting internal sources. It also doesn't block external spoofing.
- Option C is incorrect: Forcing TLS encrypts mail in transit but does not address the issue of internal mail being marked as spam based on its origin or block spoofing attempts based on sender identity.
Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?
Correct Option: C
β Option C (Correct) Reasoning: Removing client IDs and scopes from domain-wide delegation immediately revokes API access for applications, including many add-ons, that exploit this high-privilege method to access Workspace data without individual user consent. This directly addresses cutting off add-on access immediately and implicitly blocks future unauthorized domain-wide delegated apps while preserving user sign-in (SSO) for third-party sites.
β Why the other choices are incorrect:
- Option A is incorrect: Modifying Marketplace settings only prevents new user installations from the Marketplace. It does not revoke access for already installed add-ons or prevent non-Marketplace/domain-wide delegated apps from accessing data.
- Option B is incorrect: Setting all API services to "restricted access" is an overly broad action. It would severely disrupt many legitimate Workspace functions and approved third-party sign-ins (SSO), which the scenario explicitly approves.
- Option D is incorrect: Blocking each connected app's access individually is a manual, time-consuming process. It does not provide the immediate, global cut-off of all add-ons access required by the scenario.
As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore from one satellite office and that they receive an error message that βa company policy is blocking access to this app.β The users have no issue with Gmail or Google Calendar. While investigating, you learn that both this office's Internet Service Provider (ISP) and the global IP address when accessing the internet were changed over the weekend. What is the most logical reason for this issue?
Correct Option: A
β Option A (Correct) Reasoning: Context-Aware Access (CAA) allows administrators to define access levels based on IP ranges and apply them to specific apps like Google Drive. When the satellite office's IP address changed, their access no longer matched the defined CAA policy, causing the "company policy" error for Drive, while other services remained unaffected.
β Why the other choices are incorrect:
- Option B is incorrect: "Whitelisted domains" in Drive and Docs sharing settings manage external sharing permissions, not internal user access to the Drive application itself. This would not cause a block for users trying to access Drive.
- Option C is incorrect: The Network Mask for SSO with 3rd Party IdPs is related to authentication origin. Since users can access Gmail and Calendar, the SSO configuration is likely functioning, and this setting wouldn't selectively block Drive.
- Option D is incorrect: Registering IP ranges for Drive API access pertains to programmatic API usage by applications, not direct end-user access to Google Drive through web browsers or client applications.
An end user informs you that they are having issues receiving mail from a specific sender that is external to your organization. You believe the issue may be caused by the external entityβs SPF record being incorrectly configured. Which troubleshooting step allows you to examine the full message headers for the offending message to determine why the messages are not being delivered?
Correct Option: C
β Option C (Correct) Reasoning: The Security Investigation Tool in the Google Admin console allows administrators to search for specific email messages and view their full original headers. These headers include critical authentication details like SPF, DKIM, and DMARC results, which are essential for diagnosing delivery issues caused by misconfigured external sender records.
β Why the other choices are incorrect:
- Option A is incorrect: Postmaster Tools provides aggregated data on sender reputation and delivery rates to Gmail, not individual message headers for incoming emails to an organization.
- Option B is incorrect: While the Email Log Search tracks messages, it typically does not expose the full, raw message headers needed for deep authentication troubleshooting directly within its interface.
- Option D is incorrect: Performing an SPF record check confirms the record's validity. However, it does not provide the specific message headers or Google Workspace's authentication results for a particular failing email.
Your companyβs Google Workspace primary domain is βmycompany.com,β and it has acquired a startup that is using another cloud provider with a domain named βmystartup.com.β You plan to add all employees from the startup to your Google Workspace domain while preserving their current mail addresses. The startup CEO's email address is andrea@mystartup.com, which also matches your company CEO's email address as andrea@mycompany.com, even though they are different people. Each must keep the usage of their email. In addition, your manager asked to have all existing security policies applied for the new employees without any duplication. What should you do to implement the migration?
Correct Option: A
β Option A (Correct) Reasoning: Creating a secondary domain allows distinct user accounts (e.g., andrea@mystartup.com and andrea@mycompany.com) within the same Google Workspace instance. This preserves original email addresses for the new employees and permits applying existing security policies without duplication by assigning users to appropriate Organizational Units (OUs).
β Why the other choices are incorrect:
- Option B is incorrect: An alias domain maps to existing users; it doesn't allow creating separate accounts for identical usernames across different domains, violating the "different people" requirement. Users cannot have an alias domain as their primary email.
- Option C is incorrect: Creating a new Google Workspace instance complicates policy application and sharing; Google Workspace lacks native cross-domain trust for policy synchronization. This violates the "without duplication" requirement.
- Option D is incorrect: Creating users in mycompany.com or adding numbers violates preserving original startup email addresses. Gmail routing is a complex workaround, not a primary identity solution.
Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as βview data for all teamsβ to the HR group, but it is reporting an error when accessing the application. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?
Premium Solution Locked
Unlock all 224 answers & explanations
You have been asked to support an investigation that your litigation team is conducting. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user's awareness. What two actions should you take? (Choose two.)
Premium Solution Locked
Unlock all 224 answers & explanations
Your sales team, which is organized as its own organizational unit, is prone to receiving malicious attachments. What action should you take, as an administrator, to apply an additional layer of protection in the admin console for your sales team without disrupting business operation?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?
Premium Solution Locked
Unlock all 224 answers & explanations
As a Workspace Administrator, you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?
Premium Solution Locked
Unlock all 224 answers & explanations
When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization is about to expand by acquiring two companies, both of which are using Google Workspace. The CISO has mandated that strict βNo external content sharingβ policies must be in place and followed. How should you securely configure sharing policies to satisfy both the CISOβs mandate while allowing external sharing with the newly acquired companies?
Premium Solution Locked
Unlock all 224 answers & explanations
A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?
Premium Solution Locked
Unlock all 224 answers & explanations
Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)
Premium Solution Locked
Unlock all 224 answers & explanations
Your IT team is being asked to fulfill a query by your organization's legal department that requires an MBOX file that will be shared to a third-party partner for eDiscovery. The query must be run on multiple users. Legal has no admin rights to Google Vault. What should you do to fulfil the request?
Premium Solution Locked
Unlock all 224 answers & explanations
You received this email from the head of marketing:
Hello Workspace Admin:
Next week, a new consultant will be starting on the βmassive marketing mailingβ project. We want to ensure that they can view contact details of the rest of the marketing team, but they should not have access to view contact details of anyone else here at our company. Is this something that you can help with?
What are two of the steps you need to perform to fulfill this request? (Choose two.)
Premium Solution Locked
Unlock all 224 answers & explanations
You are in charge of automating and configuring Google Cloud Directory Sync for your organization. Within the config manager, how can you proactively prevent applying widespread deletions within your Workspace environment if your companyβs LDAP undergoes a substantial modification?
Premium Solution Locked
Unlock all 224 answers & explanations
You act as the Google Workspace Administrator for a company that has just acquired another organization. The acquired company will be migrated into your Workspace environment in 6 months. Management has asked you to ensure that the Google Workspace users you currently manage can efficiently access rich contact information in Workspace for all users. This needs to occur before the migration, and optimally without additional expenditure. What step do you take to populate contact information for all users?
Premium Solution Locked
Unlock all 224 answers & explanations
A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization uses a third-party product to filter mail before it arrives at your Workspace Domain. How should you configure Gmail to ensure that inbound messages are not seen as a spam attack due to the volume of mail being received from this product?
Premium Solution Locked
Unlock all 224 answers & explanations
You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add, edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?
Premium Solution Locked
Unlock all 224 answers & explanations
You have configured Secure Transport (TLS) Compliance for all messages coming to and from an external domain, altostrat.com, that your end users communicate with via Gmail. What will your end users experience when messages are delivered to them from altostrat.com without TLS enabled?
Premium Solution Locked
Unlock all 224 answers & explanations
As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages β whether spam, not spam, or phishing β for a specific time period. How do you find this information?
Premium Solution Locked
Unlock all 224 answers & explanations
Your default Vault retention policy for Gmail is set to 365 days. Your legal department has just informed you that emails sent and received by the customer support department are sensitive, and must be retained for only 30 days. You must enforce this new retention policy in the simplest way. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
A user has reported that they did not receive an email from one of their normal correspondents. What information do you need to collect from the user to investigate the cause of the issue?
Premium Solution Locked
Unlock all 224 answers & explanations
An employee at your company does not need access to their Workspace account while they are on leave for a year. When they return, you need to ensure they have access to their account and that all their data and current emails remain intact. Also, their shared documents must be available to other users. You must accomplish this goal in the most cost-effective way. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization is moving from a legacy mail system to Google Workspace. This move will happen in phases. During the first phase, some of the users in the domain are set up to use a different identity provider (IdP) for logging in. You need to set up multiple IdPs for various users. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
You work at a large global holding firm with multiple companies that are united under one Google Workspace deployment. You must ensure that employees can only access documents at the company in which they are employed. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
An employee at your organization is experiencing video call issues in Google Meet, and they were unable to resolve the issues by themselves.
You need to troubleshoot the issue. What should you do first?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching. In preparation for the risk assessment, you want to quickly review all the security-related settings for Gmail, Drive, and Calendar, and identify the ones that may be posing risk. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
The compliance team at your organization is conducting a legal investigation into some concerning sales activities of an employee eight months ago. The compliance team contacted you for assistance on the situation. You set up the default Google Vault retention rules so all data is retained only for one year. You must assist the compliance team with the investigation. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization has a group of users who interact with sensitive information and their accounts contain valuable files. You need to protect these users from targeted online attacks. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
An employee has been leaking confidential salary information to an external party. You must use Vault to preserve the messages for an investigation. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization has a strict requirement that your temporary employees can only send emails to and receive emails from specific external domains. You must define a policy in Google Workspace that meets this requirement for users in the temporary employee organizational unit (OU). What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization is working on a confidential project with details that cannot be shared through email with anyone outside your organization. You want to add controls in Gmail that prevent any mention of the project from being sent by employees. Only the CEO and the CFO can send information about the project over email and without a delay. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
The helpdesk at your organization reports that many users in multiple locations are not able to access Gmail, but can access other Workspace services. You must troubleshoot the issue. What should you do first?
Premium Solution Locked
Unlock all 224 answers & explanations
An employee at your organization is resigning. They are in charge of organizing and maintaining recurring team events. You want to preserve the existing meetings and transfer ownership to the resigning employee's manager. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
Your organization has confidential internal content for which only authorized employees are allowed to access. Access to this content is managed by using Google Groups. Only administrators can create and manage membership. You need to provide only the necessary functionality and follow the principle of least privilege. What should you do?
Premium Solution Locked
Unlock all 224 answers & explanations
By using Account Activity reports, you have flagged several users who are uploading large files. You want to ensure you don't run out of pooled storage and you want to stop the abuse. What should you do first?
Premium Solution Locked
Unlock all 224 answers & explanations
Full Question Bank Locked
You have reached the end of the free study guide preview. Upgrade now to unlock all 224 questions and the full simulation engine.
Certification Path
Related Certifications
Customer Reviews
Global Community Feedback
David M.
"The practice engine is incredible. It feels exactly like the real testing environment and helped me build so much confidence."
Sarah J.
"The PDF is very well organized and the explanations for the answers are actually helpful, not just random text."
Michael C.
"I was skeptical, but the content is high quality and definitely worth the price. I passed on my first try!"