Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
101
The "Shamoon" malware, used in attacks against Saudi Arabian energy companies, is what type of malware?
Answer:
A wiper
Shamoon is a destructive wiper malware. Its payload overwrites the master boot record (MBR) of infected computers, making them unbootable, and then wipes files on the hard drive, causing maximum disruption.
102
The "Storm Worm," which appeared in 2007, built a massive botnet. It spread via emails with what kind of subject lines?
Answer:
Subject lines related to recent news headlines and disasters.
The Storm Worm was a piece of social engineering malware that constantly changed its lure based on current events. It used eye-catching subject lines like "230 dead as storm batters Europe" to trick users into clicking on malicious links or opening infected attachments.
103
The Stuxnet, Flame, and Duqu malware are all believed to be part of what nation-state's cyber warfare program?
Answer:
The United States and Israel
While no country has officially claimed responsibility, extensive forensic analysis by security researchers has led to a broad consensus that these highly sophisticated pieces of malware were likely developed as part of a joint cyber-espionage and warfare program by the United States and Israel.
104
What is an "anti-malware" tool?
Answer:
It is a broader term that includes protection against viruses, spyware, adware, and other malicious software.
While the terms are often used interchangeably, "anti-malware" is a more modern and comprehensive term. "Antivirus" historically referred specifically to tools for fighting computer viruses, whereas "anti-malware" covers the full spectrum of malicious software.
105
What is a small program embedded inside a GIF image called?
Answer:
Web bug
A web bug, or tracking pixel, is a tiny, often invisible, graphic embedded in a webpage or email to track user activity.
106
Why might a full system scan with an antivirus take a long time?
Answer:
Because it is thoroughly checking every file, folder, and running process on your computer's hard drive.
A full system scan is a deep and comprehensive check of your entire system. On a computer with a large hard drive and many files, it is normal for this process to take several hours as the antivirus software meticulously examines every single file.
107
What does it mean when an antivirus program "quarantines" a file?
Answer:
It moves the infected file to a secure, isolated location on your computer to prevent it from causing further harm.
Quarantine is a safe-holding area for infected files. This isolates the file from the rest of the system, so it can't run or infect other files, and gives the user a chance to review the file before deciding to delete it permanently.
108
What is a "logic bomb"?
Answer:
A piece of malware that is set to go off when a specific condition is met, such as a certain date or the deletion of an employee's name from a payroll list.
A logic bomb is a malicious piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. They are often planted by insiders with a grudge.
109
You are on a website, and it says you must install a special "video codec" to watch a movie. This is likely:
Answer:
A trick to get you to download and install malware.
Modern web browsers have built-in support for all common video formats. A website that prompts you to download an external codec or player is almost certainly trying to deceive you into installing malware.
110
What does a "behavioral blocker" in a security suite do?
Answer:
It monitors for and blocks suspicious actions in programs, such as modifying the boot record or encrypting large numbers of files.
A behavioral blocker is a proactive security component that focuses on what a program *does* rather than what it *is*. It watches for malware-like behaviors and can stop an attack even if it's from a brand-new threat that has no signature.