The Google GCP-PGWA exam preparation guide is designed to provide candidates with necessary information about the Professional Google Workspace Administrator exam. It includes exam summary, sample questions, practice test, objectives and ways to interpret the exam objectives to enable candidates to assess the types of questions-answers that may be asked during the Google Cloud Platform - Professional Google Workspace Administrator (GCP-PGWA) exam.
It is recommended for all the candidates to refer the GCP-PGWA objectives and sample questions provided in this preparation guide. The Professional Google Workspace Administrator certification is mainly targeted to the candidates who want to build their career in Cloud domain and demonstrate their expertise. We suggest you to use practice exam listed in this cert guide to get used to with exam environment and identify the knowledge areas where you need more work prior to taking the actual Professional Google Workspace Administrator exam.
Google GCP-PGWA Exam Summary:
Exam Name
|
Professional Google Workspace Administrator |
Exam Code | GCP-PGWA |
Exam Price | $200 USD |
Duration | 120 minutes |
Number of Questions | 50 |
Passing Score | Pass / Fail (Approx 70%) |
Recommended Training / Books |
Google Cloud training Google Cloud documentation Google Cloud solutions |
Schedule Exam | Google Cloud Webassessor |
Sample Questions | Google GCP-PGWA Sample Questions |
Recommended Practice | Google Cloud Platform - Professional Google Workspace Administrator (GCP-PGWA) Practice Test |
Professional Google Workspace Administrator Syllabus:
Section | Objectives |
---|---|
Object management |
|
Manage user lifecycles with provisioning and deprovisioning processes. Considerations include: |
- Adding users (e.g., individual, bulk, automated) - Removing users (e.g., suspending, deleting, recovering) - Editing user attributes (e.g., renaming, passwords, aliases) - Creating administrative roles (e.g., default roles, custom roles) |
Configure shared drives. Considerations include: | - Transferring user data from one user to another |
Manage calendar resources | |
Configure and manage Google Groups for Business. Considerations include: |
- Configuring Google Groups - Adding users to groups - Implications of current Google Workspace APIs to development efforts - Using Apps Script to automate tasks |
Service configuration |
|
Implement and manage Google Workspace configurations based on corporate policies. Considerations include: |
- Managing company profile settings - Modifying OU policies - Managing rollout of new Google functionality to end users - Troubleshooting Google Workspace services (e.g., performance issues for services suite, apps for OUs) |
Demonstrate how to set up and configure Gmail. Considerations include: |
- Enabling email delegation for an OU - Managing Gmail archives |
Troubleshooting |
|
Troubleshoot user reports of mail delivery problems | |
Collect log files or reports needed to engage with support | |
Classify and mitigate basic email attacks. Considerations Include: |
- Configuring attachment compliance - Configuring blocked senders - Configuring email allowlist - Configuring objectionable content - Configuring phishing settings - Configuring spam settings - Managing admin quarantine - Configuring Secure Transport compliance - Configuring safety settings |
Troubleshoot workspace access and performance | |
Data access and authentication |
|
Configure policies for all devices (mobile, desktop, Chrome OS, Meet, Chrome Browser). Considerations include: |
- Company-owned vs. personal devices - Configuring personal device settings (e.g., password, Android, iOS, advanced, device approvals, app management, insights |
Configure and implement data governance policies | |
Describe how to manage third-party applications. Considerations include: |
- Configuring third-party SSO for Google Workspace - Integrating with third-party for provisioning - Integrating third-party marketplace apps to specific OUs in Google Workspace - Granting API access to applications that need access - Revoking third-party author access - Removing connected applications and sites |
Configure user authentication. Considerations include: |
- Basic user security controls (e.g., password length enforcement and 2-Step Verification) - Security aspects of identity, perimeter security, and data protection |
Support business initiatives |
|
Use Vault to assist legal teams. Considerations Include: |
- Setting retention rules (e.g., Setting retention rules, placing legal holds, searching your domain's data by user account, OU, date, or keyword, exporting data for additional processing and review, auditing reports) - Holding and exporting data - Running Vault audit reports |
Interpret reports for the business. Considerations Include: |
- Scanning email with Data Loss Prevention (DLP) - Managing content compliance rules - Configuring security and data region - Monitoring security health check - Configuring security settings - Creating security records - Designing security integration and addressing objections |
Describe how to import and export data |