Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Google Professional Chrome Enterprise Chrome-Enterprise-Administrator Questions and answers with ValidTests

Exam Chrome-Enterprise-Administrator All Questions
Exam Chrome-Enterprise-Administrator Premium Access

View all detail and faqs for the Chrome-Enterprise-Administrator exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An organization experiences a recent surge in account takeovers and suspicious activity Upon investigation a security team discovers that employees are falling victim to infostealer malware specifically designed to target Chrome browser cookies This malware is spreading through phishing emails and compromised websites, and it is capable of stealing session cookies, login credentials,and other sensitive information stored in the browser

Which measure can an administrator implement using Chrome Enterprise Core to mitigate the risks posed by cookie theft?

Options:

A.

Block the use of third-party cookies

B.

Require Enhanced Safe Browsing and enable Application Bound Encryption

C.

Invalidate user's session cookies and tokens by resetting the sign-in cookies from the Google Admin console

D.

Disallow Chrome Sync and Require Incognito mode

Expert Solution
Questions # 2:

An organization has Chrome set to auto-update The security team runs a compliance report from Chrome Enterprise Core and notices that some rarely used machines are showing an old version of Chrome However, when an engineer logs in to these PCs and checks Chrome directly, the correctupdated version appears

What is the most likely reason for this discrepancy?

Options:

A.

The auto-update feature is malfunctioning and not updating Chrome until it is launched

B.

The display version does not update until Chrome is launched

C.

The machine has a different version of Chrome installed that is not managed via auto update

D.

Network setting is blocking the unattended auto-update check

Expert Solution
Questions # 3:

An organization relies heavily on Chrome browser for daily operations News breaks about two critical hardware vulnerabilities These vulnerabilities allow attackers to potentially access sensitive information stored in the browser's memory, even across different websites and processes

Which specific Chrome Enterprise Core policy would an administrator implement to help mitigate the risks?

Options:

A.

Require Hardware-backed Key Generation for TLS

B.

Update Chrome browser to the latest stable version

C.

Manage Cross-Origin Extensions by Blocking all except an allowlist

D.

Enable Site isolation for every website

Expert Solution
Questions # 4:

A Chrome administrator notices that a Chrome browser is checking In with the Google Admin console but has not received a new cloud computer policy setting that was recently deployed. During the investigation, the administrator deletes the Chrome browser from the Google Admin console

What action can be taken to have the browser re-enroll in the Google Admin console?

Options:

A.

Delete the device management token from the device and relaunch Chrome

B.

Delete the enrollment token from the device and relaunch Chrome

C.

Delete the Chrome Policies from the device and reboot

D.

Delete the Chrome Browser Cache and sign back in to Chrome

Expert Solution
Questions # 5:

An organization has a critical extension that is force-installed on managed Chrome browsers to meet specific security needs Additionally, the organization has specified that when extensions are unpublished from the Chrome Web Store, they are also disabled The extension has been taken over by a malicious actor and has been unpublished from the Chrome Web Store

What impact will this have to the force-installed extension?

Options:

A.

The force-installed extension will be disabled for existing users only

B.

The force-installed extension will automatically be disabled

C.

The force-installed extension will observe no change

D.

The admin will receive an alert in the Google Admin console to remediate the conflict

Expert Solution
Questions # 6:

An organization is deploying 50 new devices which will be managed by a Mobile Device Management solution

Which method should be used to enroll the Chrome browser on those devices into Chrome Enterprise Core?

Options:

A.

Use Google Admin to generate an enrollment token and distribute it using mobile device management software

B.

Use Google Admin console bulk enrollment feature to generate a set of unique tokens, and thendistribute them via secure file sharing platform

C.

Generate a single device enrollment token and email it to all users, instructing them to enroll their devices individually

D.

Use Google Admin to generate 50 individual device registration keys and distribute them using mobile device management software

Expert Solution
Questions # 7:

An administrator identifies that the next major Chrome release, Chrome 130, has an issue with oneof their critical business applications. The company's Chrome browsers are currently on version 129.0.6568.91. The administrator needs to prevent browsers from updating to Chrome 130, while allowing continued updates within the Chrome 129 major version.

Which target version prefix should the administrator use in the updates setting to achieve this?

Options:

A.

129(

B.

129.

C.

1290

D.

129'"

Expert Solution
Questions # 8:

When a Chrome browser under cloud management goes to a potentially risky website, that action is logged in the Audit and Investigation Report as what type of event"?

Options:

A.

SSL Error

B.

Site Warning Unsafe Site Visit

C.

Untrusted Site Visit

D.

Site Isolation Violation

Expert Solution
Questions # 9:

In Chrome's Safe Browsing settings, which option provides the most robust protection againstonline threats and is suitable for a highly secure environment?

Options:

A.

Advanced Threat Protection

B.

Proactive Defense

C.

Secure Browsing Mode

D.

Enhanced Protection

Expert Solution
Questions # 10:

An organization uses Chrome Enterprise Core and needs to enforce specific security policies (e.g., disabling extensions, restricting website access) only for employee work-related browsing Personal browsing should remain unrestricted

Which approach is most appropriate?

Options:

A.

Require a managed browser for work-related browsing, applying the policies to all browser windows

B.

Require a managed profile for work-related browsing, applying the policies to only that profile

C.

Use a single managed profile for all users, configuring separate work and personal bookmarks to manage access

D.

Use a managed browser and set exceptions for personal use in the enterprise policies

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions