Hello Peers, Today we are going to share all week’s assessment and quizzes answers of the Google Workspace Security course launched by Coursera totally free of costâś…âś…âś…. This is a certification course for every interested student.
In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.
Check out this article – “How to Apply for Financial Ads?”
About The Coursera
Coursera, India’s biggest learning platform launched millions of free courses for students daily. These courses are from various recognized universities, where industry experts and professors teach in a very well manner and in a more understandable way.
Here, you will find Google Workspace Security Exam Answers in Bold Color which are given below.
These answers are updated recently and are 100% correctâś… answers of all week, assessment, and final exam answers of Google Workspace Security from Coursera Free Certification Course.
Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.
About Google Workspace Security Course
The Google Workspace Administration series continues with the third and final course, titled “Google Workspace Security.”
In this course, you will focus on the many components of Google Workspace Security, including how to enable and enforce two-step verification (2SV) for your users, as well as user password regulations. You will acquire knowledge regarding application security and become familiar with the processes of whitelisting and blocking API access to your account.
You will get an overview of how Google Workspace may be simply linked with a variety of preset applications developed by third parties. In addition to this, you will become familiar with the SSO options that are available in Google Workspace. Finally, you will have an understanding of how to recognize potential security concerns inside your business and learn how to mitigate those risks by utilizing the tools that are provided in the admin interface.
Participants in this course will be able to, by the time it is over, too:
- You will need to configure the default user protection settings that Google offers, such as password policies and recovery choices.
- Familiarize yourself with the recommended procedures for putting into effect and maintaining 2-step verification in your company.
- Have a solid understanding of the SSO solutions that are obtainable, as well as the distinctions between utilizing Google as an Identity Source and utilizing a third-party provider.
- You will be able to use your Google Workspace account to integrate cloud-based enterprise SAML apps while using Google as the identity provider.
- Become familiar with the process of integrating your own LDAP-compliant applications into Google Workspace by making use of the Secure LDAP service.
- To avoid malicious attacks on a Google service, restrict access to that service to only those applications that have been verified as trustworthy.
- Manage the Google Workspace Marketplace for your company to make sure that only reputable programs may be installed on the various devices in your firm.
- Utilize your organization’s security and alert centers to locate, triage, and resolve any privacy or security concerns that have been brought to your attention.
Prerequisites
It is expected that you have finished both the Introduction to Google Workspace Administration and the Managing Google Workspace courses.
What It Is That You Will Find Out
- Perform configuration tasks such as establishing a password policy and selecting recovery alternatives. Describe some of the best practices for putting in place a two-step verification system in your company.
- Gain an understanding of the SSO alternatives that are accessible and become familiar with the distinctions that exist between utilizing Google as an Identity Provider and a 3rd party provider.
- Manage the Google Workspace Marketplace for your company to make sure that only reputable programs may be installed on the various devices in your firm.
- Utilize your organization’s security and alert centers to locate, triage, and resolve any privacy or security concerns that have been brought to your attention.
Course Apply Link – Google Workspace Security
Google Workspace Security Quiz Answers
Week 1 Quiz Answers
Quiz 1: Common Security Settings
Q1. What are some best practices for reinforcing and monitoring the security of your domain?
- Disable access to less secure apps
- View and manage your users’ security settings
- Set up 2-step verification
- All of the above
Q2. The IT manager at your organization wants to know the advantages of using 2-step verification for your organization. What should you say? (Choose 2)
- It’ll greatly reduce the risk of unauthorized access if a user’s password is compromised
- We wouldn’t have to manage individual user IDs and passwords for each user
- It would be a great opportunity to make sure everyone is the organization has a security key
- It’ll reinforce our domain’s password security by requiring our users to enter an additional code or use a security key to sign in
Q3. The IT manager at your organization hasn’t had a chance to explore the admin console yet but wants to know what individual security settings he can manage for a user. What are some examples you could give him? (Choose 3)
- Require a password change
- Determine if the user is enrolled in 2-step verification
- Review a user’s administrative access
- Temporarily disable the user’s login challenge for 10 minutes
Q4. Where do you go to manage your users’ password strength?
- Security > Password monitoring
- Security > Password management
- Users > Account
- Reports > Security
Q5. Your organization has decided to enforce 2-step verification in 2 weeks. What actions should you keep in mind when enforcing 2-step verification? (Choose 3)
- You’ll want to provide a lead time for users to enroll before enforcement
- You’ll want to confirm that all of your users are enrolled before enforcement
- When you create new user accounts after enforcement, you will want to allow them a grace period before they need to enroll otherwise they will be locked out of their accounts
- Enforcing 2-step verification will not affect your users as they can still opt-out.
Quiz 2: SSO Quiz Answers
Q1. Your IT manager has just informed you that your organization has an account now with Asana and would like you to enable Single Sign On with the application. Where in the admin console would you go to configure a third-party pre-integrated cloud application, like Asana, as your service provider?
- Apps > Web and mobile apps > plus sign (+) > SETUP MY OWN CUSTOM APP from the Enable SSO for SAML Application window
- Security > Set up single sign-on (SSO) for SAML applications and provide the necessary information
- Apps > Web and mobile apps > Add App > Search for apps. Then search for Asana from the list of predefined applications
Q2. What of the following are true of the Secure LDAP service? (Choose 3)
- User’s authenticate against a local directory to gain access to Google Workspace services
- It allows you to connect your LDAP-based applications and services to Google Workspace
- It reduces maintenance as directory information is consolidated into one directory
- Users authenticate against the Google Workspace directory to gain access to LDAP compliant applications and services
Q3. When adding a pre-integrated SAML application to your Google Workspace account, which of the following must you add/upload the Service Provider’s configuration? (Choose 3)
- Google Certificate
- SSO URL
- Change Password URL
- Entity ID URL
Q4. When using a third party IdP which of the following is disabled/hidden in Google Workspace?
- Password monitoring
- Password reuse policy
- Require password change
- Password recovery
Quiz 3: Application Security Quiz Answers
Q1. Your organization wants to prevent any external application from accessing Gmail and Drive data. How would you ensure such access is prevented?
- Disable API access from the Gmail and Drive service settings
- From Security > API Permissions, ensure Trust domain owned apps is disabled. From Security > API Permissions > MANAGE GOOGLE SERVICES, restrict access to the Gmail and Drive services.
- Disable Gmail and Drive API access from the top level organization settings
- From Security > API Permissions, ensure Trust domain owned apps is enabled. From Security > API Permissions > MANAGE GOOGLE SERVICES, restrict access to the Gmail and Drive services.
Q2. You have been asked to create an allowlist of Marketplace apps to restrict which apps a user can install onto their devices. What must you do first?
- Get your users to Install the Marketplace allowlist app onto each device
- Add the names of all the trusted applications to each user’s device policy
- Change the Marketplace settings to allow users to install only allowed applications from Google Workspace Marketplace
- Complete a Domain install for each application that you want to allow
Q3. What is the expected behavior when a user tries to install a Marketplace app that has not been allowed?
- Users can not attempt to install an application that is not on the allowlist because they only see allowed apps in the Marketplace
- User’s can install an app that is not in the allowlist but they cannot grant it access to their data so it will not work
- When the user attempts to install the app they will see a message advising that the app cannot be installed because it has not been allowed
Q4. What happens to already installed applications if you block API access from the Security > API Permissions section?
- Already installed applications that use the blocked API will continue to work indefinitely
- Already installed applications that use the blocked API will continue to work until the user next signs in to Google Workspace
- Already installed applications that use the blocked API will continue to work until the application needs a new OAuth token
- Already installed applications will stop working and OAuth tokens will be revoked
Quiz 4: Security Tools Quiz Answers
Q1. Where would you go to review security recommendations for your organization?
- Security investigation tool
- Security dashboard
- Alert center
- Security health page
Q2. Which of the following statements is NOT TRUE about the alert center?
- The alert center includes additional in-depth details that enable you to take action to resolve numerous issues that might affect your organization
- The alert center enables you to view alerts and alert details directly in the admin console
- The alert center consolidates all admin created email alerts into one place
Q3. When examining messages in the security investigation tool what actions can you apply to a message? (Choose 3)
- Delete message
- Mark message as spam
- Forward to self
- View header
Q4. You have been asked by your CEO to provide a list of users who have not yet enrolled into 2-step Verification. Where can you find that information?
- Users Account Activity Report
- The Admin Audit log
- Users Security log
- Access Transparency Audit log
Conclusion
Hopefully, this article will be useful for you to find all the Week, final assessment, and Peer Graded Assessment Answers of Google Workspace Security Quiz of Coursera and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also, and follow our Techno-RJ Blog for more updates.
I have been absent for some time, but now I remember why I used to love this blog. Thanks, I?¦ll try and check back more often. How frequently you update your site?
It¦s really a cool and useful piece of information. I¦m happy that you simply shared this useful information with us. Please stay us informed like this. Thank you for sharing.
I like the valuable information you provide in your articles. I’ll bookmark your weblog and check again here frequently. I’m quite certain I’ll learn lots of new stuff right here! Best of luck for the next!
Simply a smiling visitor here to share the love (:, btw outstanding layout. “Reading well is one of the great pleasures that solitude can afford you.” by Harold Bloom.
you’re really a good webmaster. The web site loading speed is incredible. It seems that you’re doing any unique trick. Moreover, The contents are masterpiece. you’ve done a great job on this topic!