Question 41
What action should be taken to configure alerting related to phishing attacks?
Question 42
A company has reports of users sharing sensitive Google Drive content outside their domain through third-party add-ons. You need to control which third-party apps are allowed to access users' G Suite data. Which security feature should you use to achieve this?
Question 43
Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named G Suite accounts (e.g., [email protected], [email protected], [email protected]). The manager of this program wants all email to these accounts routed to the manager's mailbox account also.
What should you do?
What should you do?
Question 44
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:
* Control password policies.
* Make corporate apps available to the users.
* Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
* Control password policies.
* Make corporate apps available to the users.
* Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
Question 45
The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.
What should you do?
What should you do?