Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.
While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems. What advice would you give the development team in order to avoid the issue?
A. Use the domain-wide delegation API to avoid the limitation per account.
B. Use an exponential back-off algorithm to retry failed requests.
C. Switch from REST API to gRPC protocol for performance improvement
D. Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.
You are a Workspace Administrator with a mix of Business Starter and Standard Licenses for your users. A Business Starter User in your domain mentions that they are running out of Drive Storage Quota. Without deleting data from Drive, what two actions can you take to alleviate the quota concerns for this user? (Choose two.)
A. Add other users as "Editors" on the Drive object, thus spreading the storage quota debt between all of them.
B. Manually export and back up the data locally, and delete the affected files from Drive to alleviate the debt.
C. Make another user the "Owner" of the Drive objects, thus transferring the storage quota debt to them.
D. Perform an API query for large storage drive objects, and delete them, thus alleviating the quota debt.
E. Move the affected items to a Shared Drive. Shared Drives transfer ownership of the drive item to the domain itself, which alleviates the quota debt from that user.
Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.
What action should you take to meet these requirements?
A. Use the login audit report to export all suspicious login details for analysis.
B. Create a custom dashboard with the security investigation tool showing suspicious logins.
C. Use the account activity report to export all suspicious login details for analysis.
D. Create a custom query in BigQuery showing all suspicious login details.
Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?
A. Modify your Marketplace Settings to block users from installing any app from the Marketplace.
B. Set all API services to "restricted access" and ensure that all connected apps have limited access.
C. Remove all client IDs and scopes from the list of domain-wide delegation API clients.
D. Block each connected app's access.
Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.
What should you do?
A. Use the conflict account remove tool to remove the accounts from Google Workspace.
B. Rename the accounts to [email protected], and recreate the accounts.
C. Ask users to request a new Google Workspace account from your local admin.
D. Use the Transfer tool for unmanaged users to find the conflict accounts.
The application development team has come to you requesting that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app.
What should you do?
A. Enable all API access for Google Drive.
B. Enable "trust domain owned apps" setting.
C. Add OAuth Client ID to Google Drive Trusted List.
D. Whitelist the app in the Google Workspace Marketplace.
The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from
last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.
What should you do?
A. Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.
B. Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.
C. Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.
You are the administrator of a domain that requires iOS mobile device management. What initial steps should be taken to ensure that you can properly manage end-user iOS devices?
A. Follow the prompts under "company owned devices," and select "iOS Management." Select the option to "enforce management on iOS devices."
B. Configure an Apple Push Certificate, and select "certificate never expires."
C. Configure an Apple Push Certificate, and be sure to use a work address that can be accessed in the future.
D. In the Admin console, navigate to iOS management, and enable the Apple Push Certificate connector.
Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.
What security measures should you implement to secure data?
A. Use Roles, Script, and Owner access permissions for operations on records and data relations.
B. Enable App Maker access only for the Finance department Organization Unit.
C. Use a service account with limited permissions to access each data source.
D. Change owner access permissions to allow internal usage only.
Your company frequently hires from five to ten interns for short contract engagements and makes use of the
same generically named Google Workspace accounts (e.g., [email protected], [email protected], [email protected]). The manager of this program wants all email to these accounts routed to the manager's
mailbox account also.
What should you do?
A. Setup address forwarding in each account's GMail setting menu.
B. Set up recipient address mapping in GMail Advanced Settings.
C. Configure an Inbound Gateway route.
D. Give the manager delegated access to the mailboxes.