ASSOCIATE-GOOGLE-WORKSPACE-ADMINISTRATOR · Question #53
ASSOCIATE-GOOGLE-WORKSPACE-ADMINISTRATOR Question #53: Real Exam Question with Answer & Explanation
The correct answer is C: Use the security investigation tool to analyze Drive logs and identify the users.. The core of the problem is to identify the responsible users and the extent of past unauthorized sharing. The Security Investigation Tool is designed precisely for this purpose. It allows administrators to search and analyze various audit logs, including Drive logs, to pinpoint s
Question
You recently noticed a suspicious trend in your organization's Google Drive usage. Several users have shared sensitive documents outside the organization, potentially violating your company's data security policy. You need to identify the responsible users and the extent of the unauthorized sharing. What should you do?
Options
- AReview the organization's sharing policies in the Admin console, and update the policies to prevent
- BUse the security health page to identify misconfigured sharing settings in Drive.
- CUse the security investigation tool to analyze Drive logs and identify the users.
- DCreate an activity rule in the Security Center to alert you of future external sharing events.
Explanation
The core of the problem is to identify the responsible users and the extent of past unauthorized sharing. The Security Investigation Tool is designed precisely for this purpose. It allows administrators to search and analyze various audit logs, including Drive logs, to pinpoint specific events, users, and data.
Topics
Community Discussion
No community discussion yet for this question.