Question 41

What action should be taken to configure alerting related to phishing attacks?
  • Question 42

    A company has reports of users sharing sensitive Google Drive content outside their domain through third-party add-ons. You need to control which third-party apps are allowed to access users' G Suite data. Which security feature should you use to achieve this?
  • Question 43

    Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named G Suite accounts (e.g., [email protected], [email protected], [email protected]). The manager of this program wants all email to these accounts routed to the manager's mailbox account also.
    What should you do?
  • Question 44

    A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:
    * Control password policies.
    * Make corporate apps available to the users.
    * Remotely wipe the device if it's lost or compromised
    What two steps are required before configuring the device policies? (Choose two.)
  • Question 45

    The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.
    What should you do?