Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Google-Workspace-Administrator Associate Google Workspace Administrator Questions and Answers

Questions 4

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Options:

A.

Create a folder inside the shared drive. Share the files with the group by using the share function.

B.

Create a folder inside the shared drive. Share the folder link with the group.

C.

In the Admin console, assign Contributor access for the shared drive to each user. Assign Content Manager access for the shared drive to the single user.

D.

In the Admin console, assign Contributor access for the shared drive to the group. Assign Content Manager access for the shared drive to the single user.

Buy Now
Questions 5

You are designing a group structure for your company that will be used to grant access to a specific shared drive. You need this solution to automatically add and remove employees based on their job role. What should you do?

Options:

A.

Create a security group. Add all employees with the desired job role. Grant the security group access to the shared drive.

B.

Create a distribution list. Add all employees with the desired job role. Grant the distribution list access to the shared drive.

C.

Create a dynamic group. Set the membership criteria to the desired job role. Grant the dynamic group access to the shared drive.

D.

Create a configuration group. Add users on an exception basis. Grant the configuration group access to the shared drive.

Buy Now
Questions 6

A department at your company wants access to the latest AI-powered features in Google Workspace. You know that Gemini offers advanced capabilities and you need to provide the department with immediate access to Gemini’s features while retaining control over its deployment to ensure that corporate data is not available for human review. What should you do?

Options:

A.

Enable Gemini for the department’s organizational unit and assign Gemini licenses to users in the department.

B.

Monitor Gemini adoption through the administrator console and wait for wider user adoption before assigning licenses.

C.

Enable Gemini for non-licensed users in that department so they have immediate access to the free service.

D.

Enable Alpha features for the organization and assign Gemini licenses to all users.  

Buy Now
Questions 7

Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?

Options:

A.

Add the Trusted Workspace domain names in the Stream dialog box.

B.

Turn off live streaming to Youtube.

C.

Add participants to an organizational unit (OU). Turn on live streaming.

D.

Turn on in-house live streaming. Invite users from affiliated domains.

Buy Now
Questions 8

You are configuring Gmail for your company and want to implement a layered security approach. You decide to implement industry-standard email authentication protocols. What should you do?

Choose 2 answers

Options:

A.

Enable a default email quarantine for all users to isolate suspicious emails and determine if the messages haven't been authenticated.

B.

Configure a blocked senders rule to block all emails from unknown senders.

C.

Configure DKIM to digitally sign outbound emails and verify their origin.

D.

Disable IMAP for your organization to prevent external clients from accessing Gmail.

E.

Set up SPF records to specify authorized mail servers for your domain.

Buy Now
Questions 9

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company’s security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

Options:

A.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

B.

Assign the User Management Admin role to the security team.

C.

Assign the super admin role to the security team

D.

Create an administrator role with Security Center access. Assign the role to the security team.

Buy Now
Questions 10

Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?

Options:

A.

Run the Transfer tool to bring unmanaged users to your Workspace account.

B.

Check domain ownership in the DNS settings.

C.

Wait 24 hours after signing up for the features to become active.

D.

Upgrade to a Google Workspace Enterprise edition.

Buy Now
Questions 11

You’ve received multiple reports about a suspicious email from someone who is pretending to be from your organization’s human resources department. The email is prompting employees to click a link for a password update. You want to remediate this sender’s emails. What should you do?

Options:

A.

Use the security investigation tool to search for users who received the suspicious email, and select Mark message as phishing.

B.

Use the security investigation tool to action the suspicious email and select Mark message as spam.

C.

Create an activity rule to alert administrators to similar emails from that sender.

D.

Notify all employees and request that they report this email as spam.

Buy Now
Questions 12

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Options:

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Buy Now
Questions 13

Your organization handles a significant amount of sensitive customer data and must follow strict industry regulations. To meet an upcoming compliance deadline, you need to quickly implement a solution that automatically classifies files stored in Google Drive based on the content of files.

What should you do?

Options:

A.

Create data loss prevention (DLP) rules for Drive. Configure the rules to apply Drive labels based on content.

B.

Apply Drive labels based on content. Use Google Vault to create retention rules based on Drive labels, ensuring that data is kept for the required duration.

C.

Implement a third-party data governance tool that integrates with Drive and provides advanced classification capabilities.

D.

Add users into organizational units (OUs). Configure default file classification in Drive for the desired OUs.

Buy Now
Questions 14

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

Options:

A.

Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.

B.

Set up email forwarding from your on-premises email provider to Gmail.

C.

Create a content compliance rule to filter and route incoming emails.

D.

Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.

Buy Now
Questions 15

You notice an increase in support cases related to Chrome browser within your organization. You suspect a potential outage or service disruption with Chrome browser. You need to determine whether any information has been released about the issue and if there are any projected timelines for its resolution. What should you do first?

Options:

A.

Use the Help Assistant within the Google Admin console to identify if there was a recent outage.

B.

Collect a HAR file, and use the Google Admin Toolbox to identify potential failures.

C.

Review the Google Workspace Status Dashboard.

D.

Log a case with Chrome Enterprise support.

Buy Now
Questions 16

Your company operates several primary care clinics where employees routinely work with protected health information (PHI). You are in the process of transitioning the organization to Google Workspace from a legacy communication and collaboration system. After you sign the Business Associate Agreement (BAA), you need to ensure that data is handled in compliance with regulations when using Google Workspace. What should you do?

Options:

A.

Implement a third-party backup service that is also compliant with Google Workspace core services.

B.

Create a label for Google Drive content to help employees identify sensitive data.

C.

Instruct the staff to not store any PHI in Google Workspace core services, including Google Drive. Docs. Sheets, and Keep.

D.

Disable integrations with third-party apps and turn off non-core Google services.

Buy Now
Questions 17

Per regulatory requirements, your company is required to keep the data of employees located in Germany within Europe and the data of employees located in the US within the US. The employees in Germany are in a separate organizational unit (OU) than employees in the US. You need to ensure that where employee data is stored is in compliance with the location regulations.

What should you do?

Options:

A.

Instruct employees to use Drive for desktop to keep documents on their corporate computers.

B.

Create two Groups. Assign employees into the Germany or US Group based on their location. Use Google Drive trust rules to prevent sharing between the Groups.

C.

Navigate to the Data Regions function in the Admin console. Select the Europe region for employees in Germany, and select the US region for US employees.

D.

Navigate to the Data Regions function in the Admin console. Select 'No preference.'

Buy Now
Questions 18

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

Options:

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Buy Now
Questions 19

During a recent Google Meet video conference, several employees reported that they could not hear the presenters. The presenters confirmed that their laptops’ microphones were working. The affected employees were all using company-issued laptops. You need to quickly diagnose the source of the issue. What should you do first?

Options:

A.

Verify that the audio drivers on the affected laptops are up-to-date and functioning correctly.

B.

Check the Admin console to determine whether there are recent Meet-related notifications or alerts.

C.

Check if Context-Aware access rules were set to prevent Meet access from the user’s network location.

D.

Use the Meet quality tool for each affected user to analyze their microphone settings and configurations during the meeting.

Buy Now
Questions 20

Your company has just started using Search Ads 360. You need to limit access to Additional Google services for your entire organization by using the Admin console. Only the marketing team and a specific group of users from the web design team should have access. What should you do?

Options:

A.

Enable Search Ads 360 for both the marketing and web design team organizational units (OUs). Create a group to explicitly deny access to Search Ads 360. Assign the group to the web design users who should not have access.

B.

Enable Search Ads 360 at the top level of your organizational structure.

C.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a sub-OU under the marketing OU. and move the web design team users who need access into this sub-OU.

D.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a new group in the Admin console that includes the web design team users who need access. Enable Search Ads 360 for that group.

Buy Now
Questions 21

An end user has thousands of files stored in Google Drive. Their files are well organized with Drive labels. You need to advise the end user on how to quickly identify all files that are contracts. What should you do?

Options:

A.

Advise the user to use the Google Drive API to search for files with the keyword "contracts'

B.

Advise the user to search in Drive for files with the keyword "contracts', and use the "modified by me' filter.

C.

Advise the user to search for files that are labeled as "contracts'.

D.

Advise the user to use the Investigation tool to search for files with the keyword "contracts' and updated by you.

Buy Now
Questions 22

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external GoogleGroups with their Google Workspace accounts without interrupting internal group usage. What should you do?

Options:

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.

B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.

C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.

D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.

Buy Now
Questions 23

The innovation team at your organization has a dedicated room with prototype equipment. You need to make the room bookable, add the equipment, and ensure that there are no booking conflicts. Only the innovation team and the sales directors can access this room. What should you do?

Options:

A.

Create a separate Google Calendar resource for the room. Manually manage booking requests from both teams.

B.

Create a Google Group for the innovation team and another Google Group for sales directors. Share the room's calendar with both groups.

C.

Create a Google Calendar event for the room. Share the event with the innovation team and sales directors.

D.

Edit the Google Calendar settings for the room resource. Adjust the permission settings so only the innovation team and sales director group can view and book time on this calendar.

Buy Now
Questions 24

Your organization recently deployed Google Workspace. Over 3,000 external contacts were shared in public folders in Microsoft Exchange before the implementation. You need to ensure that these external contacts appear to domain users in Gmail. What should you do?

Options:

A.

Export the external contacts to a CSV file, upload the file to Google Drive, and instruct users to import to their My Contacts.

B.

Use Google Cloud Directory Sync to sync the external contacts from the public folders in Microsoft Exchange to the Directory.

C.

Use the Domain Shared Contacts API to add the external contacts to the Directory.

D.

Create a user account, add the external contacts, and delegate them to all users in the domain.

Buy Now
Questions 25

The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?

Options:

A.

Instruct the IT department to directly access and forward the relevant emails to the legal department.

B.

Temporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.

C.

Ask a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.

D.

Use Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.

Buy Now
Questions 26

External sharing at your company is only permitted for the sales and marketing department. Engineering is not allowed to share externally. You need to configure the sharing settings to comply with this policy. What should you do?

Options:

A.

Use a data loss prevention (DLP) solution to control external sharing based on user groups.

B.

Create separate shared drives for each department with different external sharing settings.

C.

Create organizational units (OUs) for each department. Configure different external sharing settings for each OU.

D.

Configure Drive trust rules to restrict the engineering department from sharing externally.

Buy Now
Questions 27

Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.

You need to enforce the new password policy in Google Workspace. What should you do?

Options:

A.

Share the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.

B.

Enable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.

C.

Create a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.

D.

Create a password policy in Active Directory. Enable password synchronization in GCDS.

Buy Now
Exam Name: Associate Google Workspace Administrator
Last Update: Apr 22, 2025
Questions: 90

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now Google-Workspace-Administrator testing engine

PDF (Q&A)

$31.5  $104.99
buy now Google-Workspace-Administrator pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 01 May 2025