Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Google-Workspace-Administrator PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

Google-Workspace-Administrator PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Associate Google Workspace Administrator
  • Last Update: Sep 12, 2025
  • Questions and Answers: 101
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

Google-Workspace-Administrator Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

Google-Workspace-Administrator Practice Exam Questions with Answers Associate Google Workspace Administrator Certification

Question # 6

Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?

A.

Run the Transfer tool to bring unmanaged users to your Workspace account.

B.

Check domain ownership in the DNS settings.

C.

Wait 24 hours after signing up for the features to become active.

D.

Upgrade to a Google Workspace Enterprise edition.

Full Access
Question # 7

Your organization allows employees to use their personal devices for work purposes. You want to ensure these devices follow the company’s security policies. You need to choose a mobile management solution that provides minimal passcode enforcement and allows for an admin to remotely wipe a user’s account from the device. You also want to avoid having to install agents on employees’ personal devices. What should you do?

A.

Implement Google’s advanced management on mobile devices.

B.

Implement Google’s basic management on mobile devices.

C.

Enforce a strong password policy, and enforce the password policy at the next sign-in.

D.

Deploy a third-party mobile device management (MDM) solution.

Full Access
Question # 8

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Full Access
Question # 9

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Full Access
Question # 10

Your organization collects credit card information in customer files. You need to implement a policy for your organization’s Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?

A.

Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to “block external sharing”, and enables the “Log event” option.

B.

Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.

C.

Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.

D.

Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.

Full Access
Question # 11

You manage Chrome Enterprise browsers for your large organization. You want to ensure that specific extensions are automatically installed on all managed Chrome Enterprise browsers. What should you do?

A.

Allowlist the specific Chrome browser extensions.

B.

Configure a script to deploy the extensions upon user login.

C.

Publish the extensions in the Chrome Web Store.

D.

Force-install the extensions through Chrome browser policies.

Full Access
Question # 12

Your company has offices in several different countries and is deploying Google Workspace. You're setting up Google Calendar and need to ensure that, when a user is creating a Google Calendar event, rooms are suggested in a nearby office. What should you do?

A.

Assign building ID, floor name, and floor section to define users' work locations based on defined buildings and rooms.

B.

Add your users to Google Groups by location. Add room resources to the corresponding groups.

C.

Add your users to organizational units (OUs) by location. Add room resources to the corresponding OUs.

D.

Restrict room sharing to a dynamic group based on user location.

Full Access
Question # 13

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

A.

Create a folder inside the shared drive. Share the files with the group by using the share function.

B.

Create a folder inside the shared drive. Share the folder link with the group.

C.

In the Admin console, assign Contributor access for the shared drive to each user. Assign Content Manager access for the shared drive to the single user.

D.

In the Admin console, assign Contributor access for the shared drive to the group. Assign Content Manager access for the shared drive to the single user.

Full Access
Question # 14

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Full Access
Question # 15

Your company has just started using Search Ads 360. You need to limit access to Additional Google services for your entire organization by using the Admin console. Only the marketing team and a specific group of users from the web design team should have access. What should you do?

A.

Enable Search Ads 360 for both the marketing and web design team organizational units (OUs). Create a group to explicitly deny access to Search Ads 360. Assign the group to the web design users who should not have access.

B.

Enable Search Ads 360 at the top level of your organizational structure.

C.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a sub-OU under the marketing OU. and move the web design team users who need access into this sub-OU.

D.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a new group in the Admin console that includes the web design team users who need access. Enable Search Ads 360 for that group.

Full Access
Question # 16

Per regulatory requirements, your company is required to keep the data of employees located in Germany within Europe and the data of employees located in the US within the US. The employees in Germany are in a separate organizational unit (OU) than employees in the US. You need to ensure that where employee data is stored is in compliance with the location regulations.

What should you do?

A.

Instruct employees to use Drive for desktop to keep documents on their corporate computers.

B.

Create two Groups. Assign employees into the Germany or US Group based on their location. Use Google Drive trust rules to prevent sharing between the Groups.

C.

Navigate to the Data Regions function in the Admin console. Select the Europe region for employees in Germany, and select the US region for US employees.

D.

Navigate to the Data Regions function in the Admin console. Select 'No preference.'

Full Access
Question # 17

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee’s documents for the manager and the team.

You want to minimize license cost. What should you do?

A.

Delete the former employee's Workspace account.

B.

Suspend former employee's Workspace account.

C.

Reset the password of the former employee and keep their Workspace license active.

D.

Switch the license type of the former employee's Workspace account to an Archived User license.

Full Access
Question # 18

Your company is undergoing a regulatory compliance audit. As part of the audit, you are required to demonstrate that you can preserve all electronic communications related to a specific project for a potential legal discovery process. You need to configure Google Vault to accomplish this goal. What should you do?

A.

Use the security investigation report to show Vault log events.

B.

Use the search and export functionality to identify all relevant communications within the project timeframe.

C.

Create a matter and a hold on all project-related data sources such as Email. Chat, and Drive within Google Workspace.

D.

Create a custom retention policy for the project data. Ensure that the policy covers the required retention period.

Full Access
Question # 19

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

A.

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.

Upload the HAR file to Google Drive and share the file with the Google support representative.

Full Access
Question # 20

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

A.

Adjust the organization’s mail content compliance settings in the Admin console.

B.

Advise users to individually allowlist senders.

C.

Disable spam filtering for all users.

D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Full Access
Question # 21

You are configuring Gmail for your company and want to implement a layered security approach. You decide to implement industry-standard email authentication protocols. What should you do?

Choose 2 answers

A.

Enable a default email quarantine for all users to isolate suspicious emails and determine if the messages haven't been authenticated.

B.

Configure a blocked senders rule to block all emails from unknown senders.

C.

Configure DKIM to digitally sign outbound emails and verify their origin.

D.

Disable IMAP for your organization to prevent external clients from accessing Gmail.

E.

Set up SPF records to specify authorized mail servers for your domain.

Full Access
Question # 22

A user is experiencing intermittent issues accessing their Gmail inbox. Sometimes their Gmail loads slowly, and other times the user encounters error messages that haven’t been documented. You need to effectively troubleshoot this recurring problem. What should you do?

A.

Check the Google Workspace Status Dashboard for any reported service disruptions.

B.

Instruct the user to generate a HAR file the next time they experience slowness or an error.

C.

Instruct the user to try to access Gmail from another device or network to see if the issue persists.

D.

Instruct the user to clear their browser cache and cookies.

Full Access
Question # 23

Your organization is increasingly concerned about its environmental impact. You want to assess the environmental impact of using Google Workspace services. Which report should you use?

A.

Carbon footprint report

B.

Google Environmental Report

C.

Apps Monthly Uptime report

D.

Accounts report

Full Access
Question # 24

Your organization is concerned about unauthorized access attempts. You want to implement a security measure that makes users change their password if there are twenty or more failed login attempts within one hour. You want to use the most effective and efficient approach. What should you do?

A.

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.

B.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.

C.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.

D.

Enable email alerts to notify users that they need to change their password.

Full Access
Question # 25

An end user has thousands of files stored in Google Drive. Their files are well organized with Drive labels. You need to advise the end user on how to quickly identify all files that are contracts. What should you do?

A.

Advise the user to use the Google Drive API to search for files with the keyword "contracts'

B.

Advise the user to search in Drive for files with the keyword "contracts', and use the "modified by me' filter.

C.

Advise the user to search for files that are labeled as "contracts'.

D.

Advise the user to use the Investigation tool to search for files with the keyword "contracts' and updated by you.

Full Access
Question # 26

You are configuring Google Chat for your organization. Using the Adin console, you want to enable employees to view their chat history by default and allow employees to turn off chat history. What should you do?

A.

Configure Google Vault to retain all Chat messages, and exclude organizational units (OUs) with users who want to turn Chat history off.

B.

Set the space history setting to OFF and chat history to ON.

C.

Set the top-level default conversation history setting to ON and allow users to change their history setting.

D.

Set the top-level default conversation history settings to OFF and allow users in each organizational unit (OU) to change their history setting.

Full Access
Question # 27

Your organization wants to provide access to YouTube to a select group of users for educational purposes, while restricting YouTube access for all other users. You need to implement a solution that allows for granular control over YouTube access based on user roles or groups. What should you do?

A.

Deploy a Chrome extension from the Google Workspace Marketplace that blocks YouTube for users who are not in the select user group.

B.

Configure a SAML application to manage YouTube access for different user groups.

C.

Instruct the select group of users to switch to their personal Google account when accessing YouTube.

D.

Use organizational units (OUs) to apply a policy that restricts YouTube access, and create an exception for the select group of users.  

Full Access