Want to pass your Professional Collaboration Engineer PROFESSIONAL-COLLABORATION-ENGINEER exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
A. Turn on password expiration.
B. Enforce 2FA with a physical security key.
C. Use a third-party identity provider.
D. Enforce 2FA with Google Authenticator app.
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite You want to investigate using an audit log.
What log should you use?
A. Admin audit log
B. SAML audit log
C. Drive usage audit log
D. OAuth Token audit log
Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization.
What should you do?
A. Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
B. Use Work Insights to gather adoption metrics and target your training exercises.
C. Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
D. Use a script to monitor Email attachment types and target users that aren't using Drive sharing.