2025!!
Which of the following policies allows employees to use and manage devices
purchased by the organization but restricts the use of the device for business
purposes only Answer - COBO
In which of the following attacks does the attacker send an email to the victim
asking for personal or financial information, along with a link similar to that of a
genuine website? Answer - phishing
Under which of the following policy, employees are allowed to use and manage
devices purchased by the organizations? Answer - COPE
Under which of the following policy, employees are allowed to work with a
preapproved set of devices from which the employees choose devices? Answer
- CYOD
Which of the following commands is used to add read and write permissions
for a user and group while removing the execute permission for others for the
file abc.txt? Answer - chmod ug+rw,o-x abc.txt
Which of the following commands uninstalls or removes unnecessary
packages? Answer - sudo apt autoremove application name