DumpsCafe Google-Chrome-Enterprise-Administrator

Page 1


Web: www.dumpscafe.com

Email: support@dumpscafe.com

IMPORTANT NOTICE

Feedback

We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions, please feel free to contact us at feedback@dumpscafe.com

Support

If you have any questions about our product, please provide the following items: exam code screenshot of the question login id/email please contact us at and our technical experts will provide support within 24 hours. support@dumpscafe.com

Copyright

The product of each order has its own encryption code, so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement.

Question #:1 - [Chrome Updates]

The security team requires Chrome to be updated on computers that only have intranet access with no available internet connectivity. These computers cannot be restarted, and Chrome is not updating.

How can Chrome be updated'?

Run auto-update.

Use a target version

Use force relaunch after period

Run the Chrome installer

Answer: D

Explanation

For machines with no internet connectivity, automatic updates will not work. The only way to update Chrome in this scenario is to manually run the Chrome installer with an updated version obtained through an alternative method (e.g., downloaded on a connected machine and transferred). Auto-update requires internet access, setting a target version only dictates the desired version for automatic updates, and force relaunch requires an update to be downloaded first.

Question #:2 - [Chrome Updates]

How often do extensions update"?

When Chrome is not running, the update occurs within the first few minutes of OS loading and then again every few hours when a new version is available in the Chrome Web Store, even when Chrome is not running

When Chrome is running, the update occurs within the first few minutes of launching Chrome and then again every few hours Updates occur when users sign into the Chrome Web Store

Extensions only update when the user manually initiates the update process from the Chrome Web Store's extension management page

Extensions update immediately whenever the developer publishes a new version to the Chrome Web Store, regardless of whether Chrome is running

Answer: B

Explanation

Chrome checks for extension updates periodically when the browser is running. This check typically happens within the first few minutes of launching Chrome and then again every few hours. While updates are triggered by developers publishing to the Chrome Web Store, the actual update on the user's browser happens when Chrome is active and performs these periodic checks. Option A is incorrect as extensions generally don't update when Chrome is not running. Option C describes a manual update process, which is not the default behavior. Option D is incorrect because the update on the user's end is dependent on Chrome being active and checking for updates.

Question #:3 - [Chrome Extensions]

A company is reviewing the permissions of extensions that are popular among employees The security team wants to make sure all extensions in the environment have these capabilities disabled:

* Modify to internal home page: `internal.acme.com`

* Access to the storage

* Access to history

Which actions should be taken in the company default extension Permissions and URLs fields to meet the security team’s requirements?

Add `*.acme.com` to runtime blocked hosts; Disable storage permission; Disable history permission

Add `*.acme.com` to runtime blocked hosts; Enable storage permission; Enable history permission

Add `internal.acme.com` to runtime blocked hosts; Disable storage permission; Disable history permission

Add `internal.acme.com` to runtime blocked hosts; Enable storage permission; Enable history permission

Answer: A

Explanation

To prevent extensions from modifying the internal homepage, the administrator should add `*.acme.com` to the "Runtime blocked hosts" list. The wildcard `*` ensures that any attempt to access or modify this domain

by an extension will be blocked at runtime. Additionally, to disable access to storage and history, the administrator needs to explicitly disable the "Storage" and "History" permissions within the extension management settings. Therefore, the correct combination is to block the host and disable the permissions.

Question #:4 - [Analyze Chrome Data]

Where can information about all of the profiles associated with a browser be found\*?

Chrome log events

Managed devices

Chrome Insights report

Managed browsers detail

Answer: D

Explanation

The "Managed browsers detail" page in the Google Admin console provides specific information about individual managed Chrome browser instances. This includes details about the profiles associated with that browser, such as the signed-in users and their management status. Chrome log events might contain some profile-related information but are more focused on actions. The"Managed devices" section primarily focuses on ChromeOS devices. The "Chrome Insights report" provides a high-level overview rather than detailed profile information for a specific browser instance.

Question

#:5 - [Chrome Enterprise Management Fundamentals]

Which operating system must be used to self-host a Chrome extension*?

11

Answer: B

Explanation

While the provided study guide doesn't explicitly detail the OS requirements for self-hosting Chrome extensions, general web hosting best practices suggest that Linux is a common and robust platform for serving files and managing web-related services. Its open-source nature, command-line interface, and extensive server software support make it well-suited for self-hosting compared to desktop-centric operating systems like

Windows 11 or macOS, and the client-focused ChromeOS. Self-hosting typically involves setting up a web server to distribute the extension files, a task commonly performed on Linux servers.

Question #:6 - [Chrome Enterprise Management Fundamentals]

An organization relies heavily on Chrome browser for daily operations News breaks about two critical hardware vulnerabilities These vulnerabilities allow attackers to potentially access sensitive information stored in the browser's memory, even across different websites and processes

Which specific Chrome Enterprise Core policy would an administrator implement to help mitigate the risks?

Require Hardware-backed Key Generation for TLS

Update Chrome browser to the latest stable version

Manage Cross-Origin Extensions by Blocking all except an allowlist

Enable Site isolation for every website

Answer: D

Explanation

The scenario describes vulnerabilities that could allow cross-site data leakage within the browser's memory. "Site isolation for every website" is a security feature in Chrome that isolates the rendering process for each website, preventing one site from accessing the data of another, even if a vulnerability is exploited. This policy directly addresses the risk of cross-site information leakage due to memory vulnerabilities. Option A relates to TLS security, option B is a general security best practice but doesn't directly prevent cross-site memory access, and option C manages extension behavior, not core browser memory isolation.

Question #:7 - [Chrome Extensions]

Company A uses an extension that is critical to business operations The company currently pins the version of the extension They received an updated version of the extension that delivers new functionality The Chrome administrator notices that the new version now requests all available permissions, while the previous version only requested four permissions

Which action should the Chrome administrator recommend to address this security issue?

A. B. C. D.

Use the extension's blocked hosts list to block access to risky websites

Block the extension until a new version is available that requires fewer permissions

Customize permissions for the extension to match the permissions of the previous version

Continue using version pinning until the company contacts the developer for more information on the code change

Answer: B

Explanation

A significant increase in requested permissions in a new version of a critical extension poses a security risk. The most prudent action is to block the updated extension until the administrator can verify the necessity of the new permissions or until a less permissive version is released. Version pinning (option D) only delays the issue and doesn't address the potential risk in the new version. Blocking specific hosts (option A) doesn't limit the extension's overall capabilities. Customizing permissions (option C) is generally not possible for Chrome extensions managed through the Google Admin console.

Question #:8 - [Manage Chrome Enterprise in the Cloud]

An organization uses Chrome Enterprise Core and needs to enforce specific security policies (e.g., disabling extensions, restricting website access) only for employee work-related browsing Personal browsing should remain unrestricted

Which approach is most appropriate?

A.

B. C.

D.

Require a managed browser for work-related browsing, applying the policies to all browser windows

Require a managed profile for work-related browsing, applying the policies to only that profile

Use a single managed profile for all users, configuring separate work and personal bookmarks to manage access

Use a managed browser and set exceptions for personal use in the enterprise policies

Answer: B

Explanation

The most granular and appropriate approach to apply work-related policies without affecting personal browsing is to use **managed profiles**. By requiring users to use a specific managed profile for work purposes, administrators can enforce policies only within that profile. Personal browsing in a separate, unmanaged profile will remain unaffected. Option A would apply policies to all browsing, which is not the requirement. Option C relies on bookmarks, which is not a security enforcement mechanism. Option D is generally not feasible as enterprise policies are designed to be enforced, and setting reliable exceptions for personal use within a managed browser is complex and less secure than using separate profiles. ===========

Question #:9 - [Manage Chrome Enterprise in the Cloud]

A Chrome administrator is using both Cloud policies and Local policies to apply settings to Chrome browsers The administrator wants to ensure that on Windows computers, the Cloud policies will have precedence if Cloud and Local policies conflict

What Registry value can be created under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome to achieve this?

"Value: LocalPolicyOverride Type: REG_DWORD Data 0"

"Value: PolicyOverridePreference Type REG_SZ Data Cloud"

"Value: CloudPolicyOverridesPlatformPolicy Type REG_DWORD Data 1"

"Value PolicySupercedence Type REG_SZ Data Cloud"

Answer: C

Explanation

To ensure cloud policies override local policies on Windows, the administrator needs to create a specific Registry value. The correct value is `"CloudPolicyOverridesPlatformPolicy"` of type `REG_DWORD` with data `1`. This setting explicitly tells the Chrome browser to prioritize cloud-managed policies over local policies.

Question #:10 - [Manage Chrome Enterprise in the Cloud]

An administrator is using Organizational Units (OU) to apply different Chrome browser settings to different types of devices The administrator needs to ensure that the browsers are placed in the correct OU

Which token must the administrator generate and apply?

Device Management Token

Enrollment Token

Browser Policy Token

Cloud Management Token

Answer: B

Explanation

The **Enrollment Token** is the key to associating a Chrome browser instance with a specific organizational unit (OU) in the Google Admin console during the enrollment process. By applying the correct enrollment token during setup, the browser will be placed in the designated OU and inherit the policies configured for that OU. Device Management Tokens are more relevant for ChromeOS devices. Browser Policy Tokens are not a standard term for OU assignment during enrollment. Cloud Management Token is a general term encompassing the enrollment process.

About dumpscafe.com

dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam Questions, Study Guides, Practice Tests.

We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.

View list of all certification exams: All vendors

We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below.

Sales: sales@dumpscafe.com

Feedback: feedback@dumpscafe.com

Support: support@dumpscafe.com

Any problems about IT certification or our products, You can write us back and we will get back to you within 24 hours.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.