nerdexam
GoogleGoogle

ASSOCIATE-GOOGLE-WORKSPACE-ADMINISTRATOR · Question #53

ASSOCIATE-GOOGLE-WORKSPACE-ADMINISTRATOR Question #53: Real Exam Question with Answer & Explanation

The correct answer is C: Use the security investigation tool to analyze Drive logs and identify the users.. The core of the problem is to identify the responsible users and the extent of past unauthorized sharing. The Security Investigation Tool is designed precisely for this purpose. It allows administrators to search and analyze various audit logs, including Drive logs, to pinpoint s

Security Management

Question

You recently noticed a suspicious trend in your organization's Google Drive usage. Several users have shared sensitive documents outside the organization, potentially violating your company's data security policy. You need to identify the responsible users and the extent of the unauthorized sharing. What should you do?

Options

  • AReview the organization's sharing policies in the Admin console, and update the policies to prevent
  • BUse the security health page to identify misconfigured sharing settings in Drive.
  • CUse the security investigation tool to analyze Drive logs and identify the users.
  • DCreate an activity rule in the Security Center to alert you of future external sharing events.

Explanation

The core of the problem is to identify the responsible users and the extent of past unauthorized sharing. The Security Investigation Tool is designed precisely for this purpose. It allows administrators to search and analyze various audit logs, including Drive logs, to pinpoint specific events, users, and data.

Topics

#Google Drive Security#Security Investigation Tool#Audit Logs#Incident Response

Community Discussion

No community discussion yet for this question.

Full ASSOCIATE-GOOGLE-WORKSPACE-ADMINISTRATOR PracticeBrowse All ASSOCIATE-GOOGLE-WORKSPACE-ADMINISTRATOR Questions