security-engineer video for in planning the synchronization of identities to Cloud Identity from a third-party identity provider (IdP), it's revealed that
In planning the synchronization of identities to Cloud Identity from a third-party identity provider (IdP), it's revealed that certain employees have utilized their corporate email addresses to create consumer accounts for accessing Google services. To ensure the organization maintains control over configuration, security, and lifecycle of these consumer accounts, what steps should you take? Choose two options: