Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.
Where do you find the information your CISO is interested in seeing?
A. Security > Advanced Security Settings > Phishing Attempts
B. Apps > G Suite > Gmail > Phishing Attempts
C. Security > Dashboard > Spam Filter: Phishing
D. Reporting > Reports > Phishing
Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.
Which combination of attributes will meet this objective?
A. Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
B. Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
C. Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
D. Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.
What two features are essential to reconfigure in G Suite? (Choose two.)
A. Apps > add SAML apps to your domain.
B. Reconfigure user provisioning via Google Cloud Directory Sync.
C. Replace the third-party IDP verification certificate.
D. Disable SSO with third party IDP.
E. Enable API Permissions for Google Cloud Platform.
Your company moved to G Suite last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session.
How should you accomplish this?
A. In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.
B. Room participants will need to start the meeting from the remote in the room.
C. By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.
D. Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.
Your-company.com recently started using G Suite. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.
What should you do?
A. Use the conflict account remove tool to remove the accounts from G Suite.
B. Rename the accounts to [email protected], and recreate the accounts.
C. Ask users to request a new G Suite account from your local admin.
D. Use the Transfer tool for unmanaged users to find the conflict accounts.
Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your-company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.
What steps should you take?
A. Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.
B. Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.
C. Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.
D. Set up a Default route with split delivery to route email to the on-premises server.
The application development team has come to you requesting that a new, internal, domain-owned G Suite app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app.
What should you do?
A. Enable all API access for Google Drive.
B. Enable "trust domain owned apps" setting.
C. Add OAuth Client ID to Google Drive Trusted List.
D. Whitelist the app in the G Suite Marketplace.
With the help of a partner, you deployed G Suite last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things G Suite so that you can be prepared to take advantage of new features and ensure that your organization gets the most out of the platform.
What should you do?
A. Develop a cadence of regular roadmap and business reviews with your partner.
B. Regularly scan the admin console and keep track of any new features you identify.
C. Create a Feature Release alert in the Alert Center to be alerted to new functionality.
D. Put half of your organization on the Rapid Release Schedule to highlight differences.
Your CISO is concerned about third party applications becoming compromised and exposing G Suite data you have made available to them. How could you provide granular insight into what data third party applications are accessing?
What should you do?
A. Create a report using the OAuth Token Audit Activity logs.
B. Create a report using the Calendar Audit Activity logs.
C. Create a report using the Drive Audit Activity logs.
D. Create a reporting using the API Permissions logs for Installed Apps.
After a recent transition to G Suite, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff.
What should you do?
A. Create a custom Apps Script to reset passwords.
B. Use a third-party tool for password recovery.
C. Enable non-admin password recovery.
D. Create a Google form to submit reset requests.