Professional-Collaboration-Engineer試験無料問題集「Google Cloud Certified - Professional Collaboration Engineer 認定」

Your Chief Information Security Officer is concerned about phishing.
You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks.
The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.
Where do you find the information your CISO is interested in seeing?

A company needs to create a Google group for the customer service team. The members in that group should be able to assign and track received messages, mark a topic as resolved, and add/edit tags to a topic. What group type should you use?

Your employer, a media and entertainment company, wants to provision G Suite Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact information and initiate collaboration with the VIPs using G Suite services such as Docs, Chat, and Calendar. You are responsible for configuring to meet these requirements.
What should you do?

You recently started an engagement with an organization that is also using G Suite. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.
Which configuration should you implement?

As part of your organization's security policies, users are not allowed to send credit card details over email. You have configured a content compliance rule using predefined content match set to a medium confidence threshold and a minimum match count of one. When sending emails, users have started receiving custom rejection notices stating that their message includes a credit card number, even though no credit card details were in the email. What should you do to help eliminate false positives?

Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company's Information Security policy empowers you, as a G Suite admin, to grant provisional access immediately if all of the following conditions are met:
- Access to the app is restricted to specific individuals by request
only.
- The app does not have the ability to read or manage emails.
- Immediate notice is given to the Infosec team, followed by the
submission of a security risk analysis report within 14 days.
Which actions should you take first to ensure that you are compliant with Infosec policy?

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.
What two actions should you take? (Choose two.)

Your-company. com is currently migrating to G Suite. Some legacy applications are still using an on-premises exchange server to send emails. You enabled the SMTP Relay service in Google to route the messages. During an investigation it was determined that these messages are not discoverable in Google Vault. For compliance reasons, the Legal team is requiring that these messages are retained and discoverable. What should you do?

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your-company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.
What steps should you take?

The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. It is no longer in the Trash. They have requested that you recover it.
What should you do?