1.
What is the setting called that limits who can email in and out of your district to create a “walled garden”?
Correct Answer
D. Restrict Delivery
Explanation
The setting called "Restrict Delivery" is the correct answer because it refers to a feature that limits who can send and receive emails in and out of a district, creating a "walled garden" environment. This setting is commonly used in educational institutions or organizations to control and restrict email communication to a specific group of users within the district or organization, ensuring a more secure and controlled email environment.
2.
Super Admin rights are required to do which of the following (check all that apply):
Correct Answer(s)
A. Grant super admin privileges
C. Revoke Super Admin privileges
E. Delete the domain
Explanation
Super Admin rights are required to grant and revoke super admin privileges, delete the domain, and manage device settings. These actions involve high-level administrative control and should only be performed by individuals with Super Admin privileges. Enrolling Chromebooks and creating users can be done with lower-level administrative rights and do not require Super Admin privileges.
3.
Google Vault is used to (check all that apply)
Correct Answer
C. Perform eDiscovery investigations
Explanation
Google Vault is a tool used to perform eDiscovery investigations. It allows users to search and retrieve specific information from G Suite accounts, including emails, chats, files, and documents. This feature is particularly useful for legal and compliance purposes, as it helps in identifying and collecting relevant data for investigations or legal proceedings. Google Vault does not involve backing up G Suite, restoring deleted data, or changing sharing permissions of files.
4.
Google Classroom in the Admin Console allows you to:
Correct Answer
A. Set who can create classes in your domain
Explanation
Google Classroom in the Admin Console allows you to control the settings for creating classes in your domain. This means that you can determine who has the ability to create classes within your organization. By setting these permissions, you can ensure that only authorized individuals are able to create and manage classes, maintaining control and organization within your domain.
5.
Which is NOT a best practice for creating Shared Drives (Team Drives) are (check all that apply):
Correct Answer
B. Allow all users (students and staff) to create Shared Drives
Explanation
Allowing all users (students and staff) to create Shared Drives is not a best practice because it can lead to uncontrolled and excessive creation of Shared Drives, which can result in confusion and difficulty in managing and organizing the drives effectively. It is recommended to have a controlled process, such as creating Shared Drives on a "by request" basis, to ensure proper management and organization.
6.
When working in Vault, default retention rules are applied to:
Correct Answer
C. The entire domain
Explanation
Default retention rules in Vault are applied to the entire domain. This means that the rules will be enforced for all users, organizational units (OU), and data within the domain. The retention rules determine how long data should be retained in Vault before it is automatically deleted. By applying these rules to the entire domain, organizations can ensure consistent data retention practices and comply with regulatory requirements.
7.
High school students are emailing elementary students by accident due to the autofill feature in Gmail. To alleviate this you can configure:
Correct Answer
A. Custom Directories
Explanation
Custom Directories can be configured to alleviate the issue of high school students emailing elementary students by accident. By creating separate directories for each group of students, the autofill feature in Gmail will only suggest email addresses from the appropriate directory. This will prevent the accidental selection of the wrong recipients and ensure that emails are sent to the intended recipients only.
8.
Best practices for Super Admin accounts are (check all that apply):
Correct Answer(s)
A. Enroll in 2 step verification
B. Hide accounts from the directory
D. Create separate Super Admin only accounts
Explanation
The best practices for Super Admin accounts are to enroll in 2 step verification, hide accounts from the directory, and create separate Super Admin only accounts. Enrolling in 2 step verification adds an extra layer of security to the account. Hiding accounts from the directory helps to prevent unauthorized access. Creating separate Super Admin only accounts ensures that only authorized individuals have access to the Admin Console.
9.
In Groups, to limit who can message a group you would want to set which setting:
Correct Answer
B. Who Can Post
Explanation
To limit who can message a group, you would want to set the "Who Can Post" setting. This setting determines who has the permission to post messages in the group. By restricting this setting to a specific group of people, you can control who can send messages and ensure that only authorized members can contribute to the group discussions.
10.
To turn ON a Core or Additional service you can use (check all that apply):
Correct Answer(s)
A. OUs
C. Groups
Explanation
To turn ON a Core or Additional service, you can use OUs and Groups. OUs (Organizational Units) are containers used to organize and manage users, groups, and devices in a hierarchical structure. By enabling a service at the OU level, all users and groups within that OU will have the service turned ON. Similarly, Groups can be used to enable services for multiple users at once. By adding users to a group and enabling the service for that group, all members of the group will have the service turned ON. Security Lists are not used to turn ON services, so they are not applicable in this scenario.
11.
If a user permanently deletes an important document, how long do they have to get it restored:
Correct Answer
D. 25 Days
Explanation
If a user permanently deletes an important document, they have 25 days to get it restored. This implies that there is a time limit for document recovery after deletion.
12.
Which of the following are use cases for Google Groups (check all that apply):
Correct Answer(s)
A. Team Drive Sharing
B. Gmail Distribution Lists
C. Sharing Calendars
Explanation
Google Groups can be used for Team Drive Sharing, Gmail Distribution Lists, and Sharing Calendars. These features allow users to collaborate and share files, communicate through email distribution lists, and coordinate schedules and events. Disabling Services and Setting Chrome User Settings are not use cases for Google Groups as they are unrelated to the collaboration and communication features provided by this tool.
13.
What type of calendar allows for system-wide check out/room reservations?
Correct Answer
B. Resource Calendar
Explanation
A resource calendar allows for system-wide check out/room reservations. This type of calendar is designed to manage and schedule shared resources such as meeting rooms, equipment, or facilities. It enables users to view the availability of these resources and book them accordingly. By using a resource calendar, organizations can effectively coordinate and allocate resources, ensuring that they are utilized optimally and conflicts are minimized.
14.
Which of the following are best practices for Chrome Device Settings (check all that apply):
Correct Answer(s)
A. Restrict Sign-in to a list
C. Configure Domain Name Autocomplete
Explanation
Restricting sign-in to a list ensures that only authorized users can access the Chrome device, enhancing security. Configuring Domain Name Autocomplete allows users to easily access websites within a specific domain, improving productivity and user experience.
15.
Which service should be disabled to help prevent data loss within your environment:
Correct Answer
E. Google Takeout
Explanation
Google Takeout should be disabled to help prevent data loss within your environment. Google Takeout is a service that allows users to export and download their data from various Google products. By disabling this service, users will not be able to export and potentially lose sensitive data from their Google accounts. Disabling Google Takeout ensures that data remains within the environment and reduces the risk of accidental or unauthorized data loss.