exam questions

Exam Professional Google Workspace Administrator All Questions

View all questions & answers for the Professional Google Workspace Administrator exam

Exam Professional Google Workspace Administrator topic 1 question 54 discussion

The security team for your organization is concerned about phishing attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks? (Choose two.)

  • A. Train end users to mark messages as spam when they see something suspicious.
  • B. Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.
  • C. Configure spoofing and authentication controls to quarantine messages that are perceived as threats.
  • D. Enforce confidential mode for all messages sent and received from your Workspace domain.
  • E. Force encryption on all inbound and outbound emails from your Workspace domain.
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
klu23
Highly Voted 1 year, 3 months ago
Selected Answer: CE
https://support.google.com/a/answer/6374496?hl=en-GB
upvoted 7 times
...
zanhsieh
Highly Voted 1 year, 1 month ago
Selected Answer: BC
Vote BC. A: No. End users won't 100% follow what Workspace admin instructions even they trained. D: No. Confidential mode is intended for internal use. The users still need to receive emails from outside domain, such as sales shall receive customer emails. E: No. Force encryption inbound outbound doesn't help. Phishing attacks still happen.
upvoted 6 times
...
dija123
Most Recent 4 months, 4 weeks ago
Selected Answer: BC
Agree with BC
upvoted 1 times
...
qtDirk
5 months, 2 weeks ago
Selected Answer: CE
Strongest possible. SMIME Encryption and quarantining.
upvoted 1 times
...
djdjdueufffs
9 months, 1 week ago
Selected Answer: BC
Google emails are already encrypted "Gmail messages are encrypted at rest and while in transit between data centers1. Messages transiting to third-party providers are encrypted with Transport Layer Security when possible or required by configuration1
upvoted 1 times
...
virat_kohli
12 months ago
Selected Answer: BC
B. Configure spoofing and authentication controls to warn end users about messages that are perceived as threats. C. Configure spoofing and authentication controls to quarantine messages that are perceived as threats.
upvoted 1 times
...
jcloud965
1 year ago
Selected Answer: BC
I choose B & C - even you can't do both at the same time Others options are not accurate
upvoted 2 times
...
ChizTheWhiz
1 year ago
Selected Answer: BC
B, C. as even if you enforce encryption for inbound and outbound, "encrypted" phishing emails can still be sent.
upvoted 2 times
...
dija123
1 year ago
Selected Answer: CE
C, E make sense as strong action
upvoted 1 times
...
2shyshy
1 year ago
B, C are correct
upvoted 1 times
...
bobsmith69
1 year, 2 months ago
Selected Answer: AC
A C, Basic security question
upvoted 2 times
...
[Removed]
1 year, 2 months ago
Selected Answer: BC
B C for sure
upvoted 2 times
...
Jane1234YIP
1 year, 3 months ago
Selected Answer: BC
B. Configuring spoofing and authentication controls to warn end users about messages that are perceived as threats can help raise awareness among end users and prompt them to exercise caution when encountering suspicious emails. This warning can include banners or visual indicators that notify users about potential phishing attempts, enabling them to be more vigilant while reviewing emails. C. Configuring spoofing and authentication controls to quarantine messages that are perceived as threats can provide an additional layer of protection. By quarantining suspicious messages, the security team can closely analyze them and determine if they are indeed phishing attempts before releasing them to end users' inboxes. This helps prevent potentially harmful messages from reaching end users until they are verified to be safe. Options A, D, and E do not directly address phishing prevention
upvoted 3 times
...
danaracena
1 year, 3 months ago
Selected Answer: CE
Lets not forget that is the STRONGEST option.
upvoted 3 times
...
Prosecute
1 year, 3 months ago
Selected Answer: AC
A and C
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago