Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
91
"Scareware" is a type of malware that:
Answer:
Tricks users into buying and downloading unnecessary and potentially malicious software by using fake security alerts.
Scareware is a form of social engineering that uses fear to manipulate users. It often manifests as a pop-up claiming that the user's computer is infected with viruses and that they must purchase a specific piece of software to fix it.
92
The "Sunburst" malware was a key component of what major cyberattack discovered in 2020?
Answer:
The SolarWinds supply chain attack.
In the SolarWinds attack, hackers compromised the software build process of the SolarWinds Orion platform. They inserted the Sunburst malware into legitimate software updates, which were then distributed to thousands of SolarWinds customers, creating a backdoor into their networks.
93
Why is it important to be cautious of pop-up windows that claim to have found viruses on your computer?
Answer:
They are often scareware tactics designed to trick you into installing fake antivirus software that is actually malware.
Legitimate antivirus software will not use a web browser pop-up to alert you to a threat. These pop-ups are almost always fake and are a form of scareware designed to defraud or infect you.
94
Your web browser has new toolbars that you did not install, and your search queries are being redirected to a different search engine. This is a symptom of:
Answer:
A browser hijacker.
Browser hijackers are a type of malware that modifies browser settings without permission. Unwanted toolbars, a changed homepage, and search redirection are all tell-tale signs of this type of infection.
95
A fileless malware is different from traditional malware because it:
Answer:
Exists only in a computer's memory (RAM) and does not write itself to the hard drive.
Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Because it does not rely on files and leaves no footprint on the hard drive, it can be very difficult for traditional antivirus software to detect.
96
If your antivirus subscription expires, what happens?
Answer:
The software will stop receiving updates for new virus definitions, leaving you vulnerable to new malware.
An expired antivirus program is of little use. While it may still be able to detect old viruses it already knows about, it will no longer receive the crucial updates needed to identify and block the thousands of new threats that emerge daily.
97
A "wiper" is a particularly destructive type of malware that is designed to:
Answer:
Erase all the data from a hard drive and connected storage devices.
Unlike ransomware that holds data hostage, wiper malware's sole purpose is destruction. It is designed to permanently delete or "wipe" all data from the infected system, often leaving it unbootable.
98
An "intrusion detection system" (IDS) is a tool that:
Answer:
Monitors network or system activities for malicious activity or policy violations and produces reports.
An IDS is like a burglar alarm for a network. It doesn't necessarily stop an attack in progress (that's the job of an Intrusion Prevention System, or IPS), but it is designed to detect suspicious patterns and alert administrators to a potential threat.
99
You receive an unexpected email from a friend with a generic subject line like "Check this out!" and a link. This could be an infection attempt because:
Answer:
Your friend's email account may have been compromised and is being used to spread malware.
Even if an email is from a known contact, you should be suspicious of unexpected messages with generic text and links. It's a common tactic for malware to spread by hijacking email accounts and sending malicious links to the victim's contacts.
100
In addition to antivirus software, what other tool provides a crucial layer of defense by monitoring network traffic?
Answer:
A firewall
A firewall acts as a barrier between your computer and the internet. It can block malware from entering your network in the first place and can also prevent malware already on your computer from communicating with its master servers.