This page was exported from Free Exam Dumps Collection [ http://free.examcollectionpass.com ] Export date:Thu Apr 3 6:12:50 2025 / +0000 GMT ___________________________________________________ Title: [Q24-Q41] Professional-Collaboration-Engineer Certification Exam Dumps Questions in here [May-2022] --------------------------------------------------- Professional-Collaboration-Engineer Certification Exam Dumps Questions in here [May-2022] Updated Professional-Collaboration-Engineer Exam Practice Test Questions NO.24 Your Chief Information Security Officer is concerned about phishing.You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks.The CISO is curious as to how many such email phishing attempts you’ve avoided since putting the 2FA+Hardware Keys in place last month.Where do you find the information your CISO is interested in seeing?  Security > Advanced Security Settings > Phishing Attempts  Apps > G Suite > Gmail > Phishing Attempts  Security > Dashboard > Spam Filter: Phishing  Reporting > Reports > Phishing NO.25 Your company’s Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy.What should you do?  Access the Security Menu> API Reference > disable all API Access.  Access the Security Menu > API Permissions > choose Drive and Disable All Access.  Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.  Access Apps > G Suite > Drive and Docs > Sharing Settings and disable sharing outside of your domain NO.26 The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one is in violation of the new security policy.What should you do?  Enable “Suspicious login” rule – Other Recipients: CTO  Enable “Suspended user made active” rule – Other Recipients: CTO  Enable “Email settings changed” rule – -Other Recipients: CTO  Enable “Suspended user made active” rule and select “Deliver to” Super Administrator(s) Explanation/Reference:NO.27 Security and Compliance has identified secure third-party applications that should have access to G Suite data. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)  Whitelist Trusted Apps  Disable the Drive SDK  Restrict API scopes  Disable add-ons for Gmail  Whitelist G Suite Marketplace apps NO.28 Your company policy requires that managers be provided access to Drive data once an employee leaves the company.How should you grant this access?  Make the manager a delegate to the former employee’s account.  Copy the data from the former employee’s My Drive to the manager’s My Drive.  Transfer ownership of all Drive data using the file transfer ownership tool in the G Suite Admin console.  Login as the user and add the manager to the file permissions using the “Is owner’ privilege for all Drive files. NO.29 After making a recent migration to G Suite, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in G Suite. You need to resolve this issue.What should you do?  Train users to use G Suite’s merge contacts feature.  Enable directory contact deduplication in the G Suite Admin panel.  Update shared contact search rules to exclude internal users.  Create a new global directory, and delete the original. NO.30 Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization.What should you do?  Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.  Use Work Insights to gather adoption metrics and target your training exercises.  Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.  Use a script to monitor Email attachment types and target users that aren’t using Drive sharing. NO.31 Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.What two features are essential to reconfigure in G Suite? (Choose two.)  Apps > add SAML apps to your domain.  Reconfigure user provisioning via Google Cloud Directory Sync.  Replace the third-party IDP verification certificate.  Disable SSO with third party IDP.  Enable API Permissions for Google Cloud Platform. NO.32 Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit.What should you do?  From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.  From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.  From the G Suite Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.  From the Admin Console Users Menu, download a list of all user info columns and currently selected columns. Explanation/Reference: https://support.google.com/a/answer/7348070?hl=enNO.33 Users in your organization have seen a high volume of customer invoices ending up in spam. A customer has provided the following message header for an email that was sent to spam (please see image above.) You need to prevent these emails from going to spam. What should you do?  Ask the customer to create an approved sender list.  Set the DMARC Percent Option to 100%.  Update SPF records to include all IPs.  Enable DKIM signing to add a DKIM signature to all outgoing messages. NO.34 A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network.Where should you enable this in the Chrome management settings?  Randomly scatter auto-updates.  Update over cellular.  Disable Auto update.  Throttle the bandwidth. Explanation ExplanationNO.35 Ursa Major Solar recently enabled External Default Sharing and has told the Architect they want to allow for external users to have the External Sharing Default set to Public Read-Only for a custom object.What are two valid Internal Default sharing settings for the custom object? (Choose two.)  Controlled by Parent  Public Read Only  Private  Public Read/Write NO.36 Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider.You are responsible for configuring to meet this request.What should you do?  Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.  Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check “Encrypt message if not encrypted”.  Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.  Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check “Change route” to send to your third-party encryption provider to encrypt. NO.37 Your company works regularly with a partner. Your employees regularly send emails to your partner’s employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.What should you do?  Educate users on creating personal contacts for the Partner Employees.  Add a secondary domain for the Partner Company and create user entries for each Partner user.  Create shared contacts in the Directory using the Directory API.  Create shared contacts in the Directory using the Domain Shared Contacts API. NO.38 Your company moved to G Suite last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session.How should you accomplish this?  In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.  Room participants will need to start the meeting from the remote in the room.  By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.  Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time. NO.39 Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information.What should you do?  Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.  Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.  Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.  Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL. https://auth0.com/docs/protocols/saml/saml-configuration/troubleshoot/auth0-as-spNO.40 Get Cloudy Consulting uses a strict security model. They enforce this model through object, field, and row- based security mechanisms. The Chief Technology Officer (CTO) at Get Cloudy Consulting wants to thoroughly test the security model, and an Architect decides to use Apex automated tests to fulfill the CTO’s request.What are three considerations for the Architect when using the runAs() method to design Apex unit tests?(Choose three.)  runAs() can be used inside of test classes to validate field-level permissions  runAs() can be used inside of test classes to validate record-level security  runAs() does NOT enforce user permissions or field-level permissions in test classes  runAs() counts towards total DML statements issued within the transaction  runAs() can be used outside of test classes to bypass record-level security NO.41 Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app.What should you do?  For the Finance OU, enable the third-party app in SAML apps.  For the Finance OU, enable the third-party app in Marketplace Apps.  At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the G Suite Marketplace.  At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the G Suite Marketplace. https://support.google.com/a/answer/6089179?hl=en Loading … Pass Google Cloud Certified Professional-Collaboration-Engineer Exam With 96 Questions: https://www.examcollectionpass.com/Google/Professional-Collaboration-Engineer-practice-exam-dumps.html --------------------------------------------------- Images: https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-05-05 15:53:10 Post date GMT: 2022-05-05 15:53:10 Post modified date: 2022-05-05 15:53:10 Post modified date GMT: 2022-05-05 15:53:10