Question 46
A user does not follow their usual sign-in pattern and signs in from an unusual location.
What type of alert is triggered by this event?
What type of alert is triggered by this event?
Question 47
Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider.
You are responsible for configuring to meet this request.
What should you do?
You are responsible for configuring to meet this request.
What should you do?
Question 48
Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration.
Which scenario could require an alternative deployment strategy?
Which scenario could require an alternative deployment strategy?
Question 49
Your organization recent Google? six months ago. Last week, a new feature appeared in users' Gmail, and your CTO was surprised because he did not know the change was happening. The CTO wants to be updated proactively about new features. What is the best source of real-time information to keep the CTO informed?
Question 50
Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization.
What should you do?
What should you do?