Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
91
To protect against SIM swap scams, you should:
Answer:
All of the above.
Securing your mobile account with a PIN, using more secure 2FA methods like authenticator apps, and being alert to signs of a SIM swap are all important preventative measures.
92
What is the top-level domain (TLD) in the URL "[https://www.example.co.uk](https://www.google.com/search?q=https://www.example.co.uk)"?
Answer:
.co.uk
The top-level domain (TLD) is the last part of a domain name. In this case, ".co.uk" is the TLD. It's important to pay attention to the TLD, as scammers may use unusual TLDs to create deceptive URLs.
93
Which of the following is a less common form of phishing?
Answer:
QR code phishing (Quishing)
While less common than email or SMS phishing, "quishing" involves tricking users into scanning a malicious QR code that can lead to a fake website or download malware. Fax phishing is extremely rare now, and carrier pigeon phishing is not a real threat.
94
How can you identify a secure website?
Answer:
Look for "https" at the beginning of the URL and a padlock icon in the address bar.
The "https" and the padlock icon indicate that the website is using a secure, encrypted connection. While not a guarantee of the site's trustworthiness, it is a crucial first step for any site where you might enter personal information.
95
"Smishing" is a type of phishing that is carried out through which communication channel?
Answer:
SMS (text messages)
Smishing is a portmanteau of "SMS" and "phishing." It is a type of phishing attack where scammers use fraudulent text messages to trick people into giving away sensitive information.
96
An attacker calls an employee pretending to be from the IT department and asks for their password to perform a system update. This is an example of:
Answer:
Pretexting
Pretexting is when an attacker creates a fabricated scenario (the pretext) to gain the victim's trust and convince them to provide information or perform an action they wouldn't normally do.
97
"Vishing" is a phishing attack conducted through:
Answer:
Voice calls
Vishing, or voice phishing, is the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information.
98
Why are social engineering attacks so successful?
Answer:
They exploit natural human tendencies like trust, fear, and curiosity.
The success of social engineering lies in its ability to exploit fundamental human emotions and cognitive biases. It's often easier to trick a person than to hack a computer system.
99
How can you protect your personal information online?
Answer:
All of the above.
Protecting your identity online requires a combination of good habits, including limiting the amount of personal data you share publicly and using strong security practices for your online accounts.
100
A phishing email might try to create a sense of panic by claiming your account has been compromised. Why is this effective?
Answer:
It causes the recipient to act impulsively without thinking.
By creating a sense of panic or urgency, phishing attacks exploit human psychology to make people act rashly and bypass their usual security checks, leading them to click on malicious links or provide information without proper scrutiny.