Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

VMware Exam 2V0-62.23 Topic 7 Question 30 Discussion

Actual exam question for VMware's 2V0-62.23 exam
Question #: 30
Topic #: 7
[All 2V0-62.23 Questions]

A Workspace ONE UEM administrator is concerned about the security of their organization's mobile devices. The concern is with jail-broken or rooted devices accessing company resources or navigating within the company network. The company's CIO wants a no-tolerance policy for devices in this state, requesting that they be removed immediately if detected.

How can the administrator enforce the policy using Workspace ONE UEM?

Show Suggested Answer Hide Answer
Suggested Answer: C

To enforce a no-tolerance policy for jailbroken or rooted devices, an administrator should configure a compliance policy in Workspace ONE UEM that checks for a compromised status. If a device is compromised, the configured action should be to enterprise wipe the device immediately. Reference: VMware Workspace ONE UEM documentation on compliance policies.


Contribute your Thoughts:

Yuki
26 days ago
That's a good point, Kirk. Maybe a combination of options A and C could be the best approach to balance security and user communication.
upvoted 0 times
...
Kirk
28 days ago
I'm not sure about option C. Sending an email to the user first, like in option A, might give them a chance to fix the issue before wiping the device.
upvoted 0 times
...
Junita
1 months ago
I agree with Yuki. Option C seems like the most efficient way to enforce the policy and prevent any security breaches.
upvoted 0 times
...
Tracey
1 months ago
Nah, I'd go with B. Blacklisting the jail-break apps is a good way to prevent the issue in the first place. Proactive approach, you know?
upvoted 0 times
Ivan
3 days ago
B) Blacklisting the jail-break apps is a good way to prevent the issue in the first place.
upvoted 0 times
...
Tegan
24 days ago
A) Configure a compliance policy to check for Compromised Status = Compromised. Configure the compliance action to send an email to the user asking them to unenroll.
upvoted 0 times
...
Adelina
27 days ago
B) Configure an application blacklist policy for one of the apps that is used to jail-break or root devices.
upvoted 0 times
...
...
Shayne
1 months ago
Haha, the CIO must be really serious about this 'no-tolerance' policy. Enterprise wipe is the only way to make sure those devices are out of the network for good!
upvoted 0 times
Rosalyn
21 days ago
User 2
upvoted 0 times
...
Carmelina
29 days ago
User 1
upvoted 0 times
...
...
Lisbeth
2 months ago
I agree, C is the best choice. Can't have those jail-broken devices accessing sensitive company resources. Gotta shut 'em down fast!
upvoted 0 times
...
Nieves
2 months ago
Option C is the way to go. Immediate enterprise wipe for those compromised devices - no messing around with that security risk!
upvoted 0 times
Renea
27 days ago
I think the CIO will be pleased with the quick action of enterprise wiping compromised devices.
upvoted 0 times
...
Fabiola
29 days ago
Agreed, it's better to be safe than sorry when it comes to security threats.
upvoted 0 times
...
Mitzie
1 months ago
Definitely, we can't take any chances with compromised devices accessing company resources.
upvoted 0 times
...
Mitsue
1 months ago
Option C is the way to go. Immediate enterprise wipe for those compromised devices - no messing around with that security risk!
upvoted 0 times
...
...
Yuki
2 months ago
I think option C is the best choice. We need to wipe compromised devices immediately to protect our company's security.
upvoted 0 times
...

Save Cancel