최신 Professional-Collaboration-Engineer 무료덤프 - Google Cloud Certified - Professional Collaboration Engineer

Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.
Which combination of attributes will meet this objective?

정답: C
Your organization has been on G Suite Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the G Suite environment. The chief security officer wants that data brought into your existing SIEM system.
What are two ways you should accomplish this? (Choose two.)

정답: A,C
Your organization recent Google? six months ago. Last week, a new feature appeared in users' Gmail, and your CTO was surprised because he did not know the change was happening. The CTO wants to be updated proactively about new features. What is the best source of real-time information to keep the CTO informed?

정답: C
Your company has purchased a new six-story building that has 20 meeting rooms of various sizes. One of the meeting rooms is an executive conference room that only one person should be able to see and book. You have created that executive conference room in the G Suite > Calendar > Resources menu and need to restrict the sharing settings for that executive conference room. What two actions should you take?

정답: B,D
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company's Information Security policy empowers you, as a G Suite admin, to grant provisional access immediately if all of the following conditions are met:
- Access to the app is restricted to specific individuals by request
only.
- The app does not have the ability to read or manage emails.
- Immediate notice is given to the Infosec team, followed by the
submission of a security risk analysis report within 14 days.
Which actions should you take first to ensure that you are compliant with Infosec policy?

정답: B
External Company is reporting that they are not receiving messages from your users. Your users are reporting that everything is sending fine and they are not receiving bounceback messages or any notifications. You need to determine what could be causing the non-delivery and why they aren't receiving the notifications. What should you do?

정답: D
Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.
What should you do?

정답: A
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite You want to investigate using an audit log.
What log should you use?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
What action should be taken to configure alerting related to phishing attacks?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.
What should you do?

정답: B

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기