Question 61
Your CISO is concerned about third party applications becoming compromised and exposing G Suite data you have made available to them. How could you provide granular insight into what data third party applications are accessing?
What should you do?
What should you do?
Question 62
As part of your organization's security policies, users are not allowed to send credit card details over email. You have configured a content compliance rule using predefined content match set to a medium confidence threshold and a minimum match count of one. When sending emails, users have started receiving custom rejection notices stating that their message includes a credit card number, even though no credit card details were in the email. What should you do to help eliminate false positives?
Question 63
Your company uses G Suite and has acquired a subsidiary that, for business reasons, will remain indefinitely on its existing third-party collaboration platform and legacy LDAP system. This subsidiary operates autonomously with a separate, unfederated Active Directory forest. It is anticipated that interaction between the two companies will be infrequent and primarily conducted via email. Leadership's minimum requirement is adding employees of that subsidiary to your corporate global address book (GAL). What should you do?
Question 64
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite You want to investigate using an audit log.
What log should you use?
What log should you use?
Question 65
Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy.
What should you do?
What should you do?