Google Professional ChromeOS Administrator Exam Questions

Page: 1 / 14
Total 117 questions
Question 1

A user reports that their Chrome device has been stolen. What should the administrator do?



Answer : C

When a Chrome device is reported stolen, the administrator should immediately take action to protect the data and prevent unauthorized access. The most effective step is to disable the device through the Google Admin console. This will prevent anyone from signing in to the device, rendering it unusable.

Here's how to disable a stolen Chrome device:

Sign in to Google Admin console: Use your administrator credentials.

Navigate to Devices: Go to Devices > Chrome > Devices.

Locate the Device: Find the stolen device using its serial number or other identifying information.

Disable the Device: Click on the device and select 'Disable.'

This will disable the device and prevent anyone from signing in, even if they try to reset the device.


Question 2

A large pharmaceutical company signs up for a Chrome trial and wants to order Chrome licenses. An admin needs to verify the domain.

How can an admin verify the domain in the Admin console?



Answer : C

To verify a domain in the Google Admin console, you must add a TXT record to the DNS settings at the domain registrar. This method confirms domain ownership by allowing Google to check for the specific TXT entry.

Verified Answer from Official Source:

The correct answer is verified from the Google Workspace Setup Guide, which outlines the domain verification process via DNS TXT records.

'To verify your domain, sign in to your domain registrar and add a TXT record to the DNS settings. This confirms ownership for Google services.'

Adding a TXT record is the standard method for proving domain ownership, which is essential when setting up Google services for a new domain.

Objectives:

Verify domain ownership for Google services.

Configure DNS settings appropriately.


Google Workspace Setup Guide

Question 3

You need to create a recovery image on a USB stick. Which two steps should you take?

(Choose 2 answers)



Answer : B, C

Creating a recovery image for ChromeOS involves using the Chrome Recovery Utility, which is available in the Chrome Web Store. This tool allows users to create a recovery USB drive by downloading the necessary OS image and writing it to the USB stick.

Verified Answer from Official Source:

The correct answers are verified from the ChromeOS Recovery Guide, which specifies the use of the Chrome Recovery Utility from the Chrome Web Store.

'To create a ChromeOS recovery image, download the Chrome Recovery Utility from the Chrome Web Store. Follow the on-screen instructions to create a recovery USB stick.'

The Recovery Utility is the recommended method for creating a USB recovery device, ensuring compatibility and correctness of the OS image.

Objectives:

Perform system recovery for ChromeOS devices.

Utilize official recovery tools.


ChromeOS Recovery Guide

Question 4

What are two reasons that Chromebooks never experienced a ransomware attack?

(Choose 2 answers)



Answer : A, E

Chromebooks have proven resilient against ransomware attacks for the following reasons:

All applications run in a sandbox: Each app operates in an isolated environment, preventing malicious code from affecting the system or other apps.

Devices go through a Verified Boot process: This feature ensures that the operating system has not been tampered with, reverting to a known safe version if a compromise is detected.

Verified Answer from Official Source:

The correct answers are verified from the Google ChromeOS Security Overview, which outlines sandboxing and Verified Boot as key security measures.

'ChromeOS leverages application sandboxing to isolate processes and uses Verified Boot to ensure system integrity, thereby protecting against malware and ransomware.'

These security mechanisms prevent ransomware from embedding itself into the OS or spreading to other parts of the system, making Chromebooks inherently more secure.

Objectives:

Understand ChromeOS security architecture.

Recognize the role of sandboxing and verified boot in preventing attacks.


Google ChromeOS Security Overview

Question 5

What should an administrator do to view the number and type of ChromeOS upgrades purchased and in use by their domain?



Answer : B

To view the number and type of ChromeOS upgrades purchased and in use, administrators should check the 'Subscriptions' section in the billing area of the Google Admin console. This section provides a clear overview of the organization's ChromeOS upgrade subscriptions and usage.

Other options are incorrect because they don't directly provide information about ChromeOS upgrade subscriptions:

Option A (Verify upgrades on devices page): Shows upgrades on individual devices, not the overall purchase and usage.

Option C (Contact partner to verify): Unnecessary if the information is readily available in the Admin console.

Option D (Check reports page for upgrades): Might provide some usage data, but not the purchase details.


Sign in to your Admin console: https://support.google.com/chrome/a/answer/182076?hl=en

Question 6

You're in charge of deploying video conferencing equipment and it has been decided that you will leverage ChromeOS devices. What initial considerations should you make when deciding on devices?



Answer : B

When deploying video conferencing equipment using ChromeOS devices, the primary consideration is choosing a form factor (device type) that caters to both remote and on-site workers. This ensures flexibility and consistent user experience regardless of location.

Option A is incorrect because while instructional guides are helpful, they are a secondary concern to device suitability.

Option C is incorrect because security patch timing is important but not the initial consideration when choosing devices.

Option D is incorrect because while specifications matter, they should align with the chosen form factor and user needs.


Question 7

What are two methods for signing in to a Chrome OS device? Choose 2 answers



Answer : B, D

Single sign-on (SSO): This allows users to sign in to their Chrome OS device using their organizational credentials. This is particularly useful in enterprise or educational settings where users already have an existing account.

Facebook Connect: This allows users to sign in to their Chrome OS device using their Facebook credentials. This can be convenient for users who are already logged into Facebook on another device.

Options A and C are incorrect:

SMS code sent to mobile phone: This is not a standard sign-in method for Chrome OS devices.

Google Friend Connect: This was a social networking service that has been discontinued.


Page:    1 / 14   
Total 117 questions