AND ANSWERS
Which of the following policies allows employees to use and manage devices purchased by the
organization but restricts the use of the device for business purposes only - ANS COBO
In which of the following attacks does the attacker send an email to the victim asking for
personal or financial information, along with a link similar to that of a genuine website? -
ANS phishing
Under which of the following policy, employees are allowed to use and manage devices
purchased by the organizations? - ANS COPE
Under which of the following policy, employees are allowed to work with a preapproved set of
devices from which the employees choose devices? - ANS CYOD
Which of the following commands is used to add read and write permissions for a user and
group while removing the execute permission for others for the file abc.txt? - ANS chmod
ug+rw,o-x abc.txt
Which of the following commands uninstalls or removes unnecessary packages? - ANS sudo
apt autoremove application name
Which of the following best describes how an administrator can prevent local or remote users
from exploiting vulnerabilities in files that execute with root privileges? - ANS By finding and
1
disabling unwanted SUID and SGID binaries
Page
@COPYRIGHT @THEBRIGHT 2025/2026