New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

VMware Exam 2V0-62.23 Topic 7 Question 30 Discussion

Actual exam question for VMware's 2V0-62.23 exam
Question #: 30
Topic #: 7
[All 2V0-62.23 Questions]

A Workspace ONE UEM administrator is concerned about the security of their organization's mobile devices. The concern is with jail-broken or rooted devices accessing company resources or navigating within the company network. The company's CIO wants a no-tolerance policy for devices in this state, requesting that they be removed immediately if detected.

How can the administrator enforce the policy using Workspace ONE UEM?

Show Suggested Answer Hide Answer
Suggested Answer: C

To enforce a no-tolerance policy for jailbroken or rooted devices, an administrator should configure a compliance policy in Workspace ONE UEM that checks for a compromised status. If a device is compromised, the configured action should be to enterprise wipe the device immediately. Reference: VMware Workspace ONE UEM documentation on compliance policies.


Contribute your Thoughts:

Yuki
6 days ago
That's a good point, Kirk. Maybe a combination of options A and C could be the best approach to balance security and user communication.
upvoted 0 times
...
Kirk
8 days ago
I'm not sure about option C. Sending an email to the user first, like in option A, might give them a chance to fix the issue before wiping the device.
upvoted 0 times
...
Junita
15 days ago
I agree with Yuki. Option C seems like the most efficient way to enforce the policy and prevent any security breaches.
upvoted 0 times
...
Tracey
18 days ago
Nah, I'd go with B. Blacklisting the jail-break apps is a good way to prevent the issue in the first place. Proactive approach, you know?
upvoted 0 times
Tegan
4 days ago
A) Configure a compliance policy to check for Compromised Status = Compromised. Configure the compliance action to send an email to the user asking them to unenroll.
upvoted 0 times
...
Adelina
7 days ago
B) Configure an application blacklist policy for one of the apps that is used to jail-break or root devices.
upvoted 0 times
...
...
Shayne
24 days ago
Haha, the CIO must be really serious about this 'no-tolerance' policy. Enterprise wipe is the only way to make sure those devices are out of the network for good!
upvoted 0 times
Rosalyn
24 hours ago
User 2
upvoted 0 times
...
Carmelina
9 days ago
User 1
upvoted 0 times
...
...
Lisbeth
27 days ago
I agree, C is the best choice. Can't have those jail-broken devices accessing sensitive company resources. Gotta shut 'em down fast!
upvoted 0 times
...
Nieves
1 months ago
Option C is the way to go. Immediate enterprise wipe for those compromised devices - no messing around with that security risk!
upvoted 0 times
Renea
7 days ago
I think the CIO will be pleased with the quick action of enterprise wiping compromised devices.
upvoted 0 times
...
Fabiola
9 days ago
Agreed, it's better to be safe than sorry when it comes to security threats.
upvoted 0 times
...
Mitzie
10 days ago
Definitely, we can't take any chances with compromised devices accessing company resources.
upvoted 0 times
...
Mitsue
12 days ago
Option C is the way to go. Immediate enterprise wipe for those compromised devices - no messing around with that security risk!
upvoted 0 times
...
...
Yuki
1 months ago
I think option C is the best choice. We need to wipe compromised devices immediately to protect our company's security.
upvoted 0 times
...

Save Cancel