- About The Coursera
- About Google Workspace Mail Management Course
- Google Workspace Mail Management Quiz Answers
Hello Peers, Today we are going to share all week’s assessment and quizzes answers of the Google Workspace Mail Management course launched by Coursera totally free of cost✅✅✅. This is a certification course for every interested student.
In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.
Check out this article – “How to Apply for Financial Ads?”
About The Coursera
Coursera, India’s biggest learning platform launched millions of free courses for students daily. These courses are from various recognized universities, where industry experts and professors teach in a very well manner and in a more understandable way.
Here, you will find Google Workspace Mail Management Exam Answers in Bold Color which are given below.
These answers are updated recently and are 100% correct✅ answers of all week, assessment, and final exam answers of Google Workspace Mail Management from Coursera Free Certification Course.
Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.
About Google Workspace Mail Management Course
The fourth and final course in the Google Workspace Administration training series is titled “Google Workspace Mail Management.”
During this training, you will get the knowledge necessary to defend your company from many forms of cyberattack, including phishing, spoofing, and malware. Y
ou will learn how to set up data loss prevention (DLP) for your company, as well as configure email compliance.
You will learn how to whitelist and prohibit senders, as well as develop a grasp of the various options for mail routing that are accessible.
Other mail options, such as inbound and outgoing gateways, third-party email archiving, and journaling to Vault, will also be introduced to you as part of this lesson.
You should have finished all of the Google Workspace Administration courses, including Introduction to Google Workspace Administration, Managing Google Workspace, and Google Workspace Security.
WHAT YOU WILL LEARN
- Learn how to protect your users from inbound phishing and harmful software (malware).
- Learn how to control which end-user access features are available to your users.
- Gain an understanding of the various compliance features provided in Google Workspace.
- Gain a basic understanding of the mail routing options available to you as the Google Workspace administrator.
Course Apply Link – Google Workspace Mail Management
Google Workspace Mail Management Quiz Answers
Week 1 Quiz Answers
Quiz 1: Domain Name System (DNS) records
Q1. Which type of DNS record determines where mail destined for your domain is routed?
- TXT Record
- CNAME Record
- MX Record
- NS Record
Q2. What are common uses for a DNS TXT record when using Google Workspace? (Choose 2)
- Domain verification
- Customise a Google service address
- Email security records
- Control inbound mail to your domain
Q3. In general, from where would you manage your domain’s DNS records?
- In the Google Workspace admin console
- In your domain registrar console
- In your local DNS files
- All of the above
Q4. You need to make a change to your MX records and you want the change to be implemented as soon as possible. What approach can you take?
- Make the change in your DNS console and reduce the Time to Live (TTL) value to 1 hour. Once the change has been implemented revert the TTL value to 24 hours
- Change your MX records in the admin console and reduce the Time to Live (TTL) value to one hour
- Make the change in your DNS console and reduce the Time to Live (TTL) value to 1 hour
- Change your MX records in the admin console and reduce the Time to Live (TTL) value to one hour. Once the change has been implemented revert the TTL value to 24 hours
Quiz 2: Enhancing email security Quiz Answers
Q1. What is the main purpose of a Sender Policy Framework (SPF) record?
- It can be used to verify that message content is authentic and has not changed
- It specifies which servers/domains can send messages on your behalf
- It defines the action to take on suspicious incoming messages
Q2. You have been asked to implement DomainKeys Identified Mail (DKIM) for your organization. How would you do this?
- Enable DKIM from Apps > Google Workspace > Gmail > Authenticate email
- Generate a DKIM record from Apps > Google Workspace > Gmail > Authenticate email. Add the record to your DNS records and then start authentication from the admin console
- Enable DKIM directly in your DNS records
- Generate a key from your DNS records and add it to the Google Workspace admin console. Then Enable DKIM from Apps > Google Workspace > Gmail > Authenticate email
Q3. What policy defines what to do if an incoming message is not authenticated?
- All of the above
Q4. DKIM adds an encrypted signature to the header of all outgoing messages. What happens if you don’t turn on email signing with your own domain DKIM key?
- Messages are sent as normal with no additional headers
- Gmail signs all outgoing messages with this default DKIM domain key d=*.gappssmtp.com
- Gmail signs all outgoing messages with a key generated using the From address in the message
Gmail signs all outgoing messages with a temporary key generated for your domain
Quiz 3: Email safety and end-user access Quiz Answers
Q1. The attachment section in the Gmail Safety settings page allows you to protect against malicious attachments. What actions can you perform on a suspicious attachment? (Choose 2)
- Send to a designated user
- Keep email in inbox and show warning
- Move email to spam
- Keep email in inbox without warning
Q2. What are valid reasons for allowing per-user outbound gateways in your organization? (Choose 2)
- Mail delivery times are improved because messages bypass the Gmail servers
- An outbound gateway can prevent the appearance of “on behalf of” addresses in the From field
- Allows your users to send mail from their business and personal Gmail account from one inbox
- An outbound gateway ensures that the same mail server delivers all messages from otherdomain and that server has a record that the mail has been sent
Q3. Google recommends against the use of the Image URL proxy whitelist?
Q4. You have enabled protection against anomalous attachment types in emails from the Gmail > Safety page but you are finding some emails with valid attachment types are not being delivered. How can you resolve this?
- Ask each user to create a whitelist of allowable file types
- Add a whitelist of allowable file types to the entry in the Attachments section on the Safety page
- You cannot control what file types are considered anomalous so you must disable this protection to allow messages to be delivered
- Have all messages that trigger this setting delivered to a quarantine and then release the messages manually
Quiz 4: Preventing of spam, phishing, and malware Quiz Answers
Q1. Messages from a single person that you trust are being marked as spam by Gmail. What approach is best to ensure that these messages reach the intended recipients inboxes?
- Add the user’s email address to your email whitelist
- Ask each of your users to add the contact to their personal contacts
- Add a spam setting which bypasses spam filters for messages received from addresses within an approved senders list. Add the user’s email address to the list
- Setup a security sandbox rule for the user to have all mail verified by the sandbox prior to delivery
Q2. Which of the following are reasons to use an inbound gateway? (Choose 2)
- Can be used for batch delivery of email to Gmail
- Spam filtering
- Message archiving
- Improves mail delivery performance
Q3. Your organization has been receiving unwanted emails from another organization and attempts by you to get the organization to stop sending the emails have failed. How can you stop messages from this organization from reaching your users?
- Ask each of your user’s to block the domain
- Configure a blocked senders list and add the domain’s IP address to the list
- Configure a blocked senders list and add the domain name to the list
- Contact Google Support and ask them to block the organization for you
Quiz 5: Compliance Quiz Answers
Q1. In which type of compliance control can you apply a Data Loss Prevention (DLP) rule for Gmail?
- Attachment compliance
- Objectionable content
- Content compliance
- Optical Character Recognition (OCR)
Q2. What actions can an administrator perform on a quarantined message? (Choose 2)
- Deliver to another recipient
- Return to sender
Q3. Which statements are true for an objectionable content rule? (Choose 2)
- In an objectionable content setting you use a predefined list of objectionable words for filtering for objectionable content
- In an objectionable content setting you create word lists for filtering for objectionable content
- An objectionable content setting works on inbound messages only
- An objectionable content setting works on inbound and outbound messages
Q4. You want to prevent your users from receiving mail from baddomain.com. What is the best way to achieve this?
- Add baddomain.com to a blocked senders list
- Configure the ‘Restrict delivery’ setting to prevent message exchange between your users and baddomain.com
- Add baddomain.com’s IP address to the blocked senders list
- Create a security sandbox rule to filter and delete messages to/from baddomain.com
Quiz 6: Mail routing Quiz Answers
Q1. Which mail delivery scheme allows messages to be delivered to multiple mailboxes?
- Direct delivery
- Split delivery
- Dual delivery
- Indirect delivery
Q2. Which features in Google Workspace can be used to leverage Google’s spam protection for users who are on a non-Gmail mail platform? (Choose 2)
- Outbound gateway
- Alternate secure route
- Non-Gmail mailbox
- SMTP Relay service
Q3. What advantages does a routing setting have over an outbound gateway when you need to route mail through an external mail server?
- A routing setting can be applied at an OU level
- A routing setting can be applied to specific senders and recipients
- Address lists can be used to control or bypass a routing setting
- All of the above
Q4. What must you define before you can change the route in a routing setting?
- A mail host
- An outbound gateway
- An SMTP relay
- Alternate secure route
Hopefully, this article will be useful for you to find all the Week, final assessment, and Peer Graded Assessment Answers of Google Workspace Mail Management Quiz of Coursera and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also, and follow our Techno-RJ Blog for more updates.