GCDL Practice Question: A company's employees use Google Workspace for…
This GCDL practice question tests your understanding of a company's employees use google workspace for…. Read the scenario carefully and evaluate each option against the stated constraints before committing to an answer. After answering, compare your reasoning against the explanation and wrong-answer breakdown below. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.
A company's employees use Google Workspace for email, documents, and collaboration. The IT team wants to require all employees to use a physical security key (like a YubiKey) as their second authentication factor when signing in — eliminating phishing-vulnerable SMS and authenticator app codes. Which Google Workspace security capability supports this requirement?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
Google Cloud Identity-Aware Proxy, which enforces hardware key authentication for all Google Workspace apps
IAP provides application-level access control for web applications hosted on Google Cloud. It's not the tool for enforcing hardware key requirements for Google Workspace sign-in.
Distractor review
Cloud Armor, which blocks sign-in attempts that don't come from corporate IP addresses, eliminating the need for 2FA
IP allowlisting through Cloud Armor doesn't apply to Google Workspace sign-in and wouldn't eliminate phishing risk (attackers can operate from allowed IPs). Hardware keys provide cryptographic authentication that makes phishing irrelevant.
Distractor review
Google Workspace Advanced Protection Program, which enforces hardware security key requirements for high-risk users
The Advanced Protection Program provides the strongest protections for specific high-risk individuals (executives, admins). For an organization-wide requirement for all employees, a broader 2SV policy requiring hardware security keys is the correct administrative control.
Best answer
Google Workspace 2-Step Verification policy configured to require hardware security keys (FIDO2/WebAuthn) for all employees, making it impossible to sign in without a physical key
Google Workspace administrators can configure the 2SV enrollment and method requirements in the Admin Console. Setting the policy to require security keys (and disabling other 2SV methods) enforces hardware key use organization-wide. Hardware keys are phishing-resistant because they cryptographically verify the site they're authenticating to.
Common exam trap
Common exam trap: NAT rules depend on direction and matching traffic
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
How to think about this question
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
KKey Concepts to Remember
- Static NAT maps one inside address to one outside address.
- PAT allows many inside hosts to share one public address using ports.
- Inside local and inside global describe the private and translated addresses.
- NAT ACLs identify traffic for translation, not always security filtering.
TExam Day Tips
- Identify inside and outside interfaces first.
- Check whether the scenario needs static NAT, dynamic NAT or PAT.
- Do not confuse NAT matching ACLs with normal packet-filtering intent.
Key takeaway
NAT direction and interface roles matter as much as the IP address mapping. Inside/outside designation controls which traffic is translated.
Related practice questions
Related GCDL practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A traditional retailer currently maintains its own data centers, purchasing servers every 3–5 years and paying for facilities, power, and staff regardless of demand. When it migrates its workloads to the public cloud, which change in cost model does it experience?
Question 2
An e-commerce company plans its infrastructure for peak shopping events (e.g., Black Friday) which drive 50× normal traffic. On-premises, they must maintain 50× capacity year-round. In the cloud, they provision 50× capacity only during peak periods. Which cloud characteristic enables this cost optimization?
Question 3
Which term describes the process by which organizations integrate digital technology into all areas of their business, fundamentally changing how they operate and deliver value to customers?
Question 4
When a company moves from maintaining its own data center to using Google Cloud, which operational responsibility does Google assume that the company previously managed?
Question 5
A hospital runs a patient records system that must remain on-premises due to strict regulatory data residency requirements. However, they also want to use cloud-based AI for diagnostic imaging analysis. Which cloud deployment model best describes their architecture?
Question 6
What is virtualization in the context of cloud computing, and why is it fundamental to how cloud providers deliver services?
Practice this exam
Start a free GCDL practice session
Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.
FAQ
Questions learners often ask
What does this GCDL question test?
Static NAT maps one inside address to one outside address.
What is the correct answer to this question?
The correct answer is: Google Workspace 2-Step Verification policy configured to require hardware security keys (FIDO2/WebAuthn) for all employees, making it impossible to sign in without a physical key — Google Workspace supports FIDO2/WebAuthn hardware security keys (like YubiKeys, Titan keys) for 2-step verification. IT administrators can require specific 2SV methods organization-wide through the Admin Console, mandating hardware security keys for all users. This provides the strongest phishing resistance — hardware keys cryptographically verify the website they're signing into, preventing credential phishing.
What should I do if I get this GCDL question wrong?
Review the four NAT address types (inside local, inside global, outside local, outside global), PAT port overload, and static vs dynamic NAT use cases. Then practise related GCDL NAT questions on configuration and troubleshooting.
About these practice questions
Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →
Discussion
Sign in to join the discussion.
This GCDL practice question is part of Courseiva's free Google Cloud certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the GCDL exam.