Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
111
What type of virus uses computer hosts to reproduce itself?
Answer:
Worm
A worm is a standalone piece of malicious software that reproduces itself and spreads from computer to computer, usually over a network. Unlike a virus, it doesn't need to attach itself to a host program to propagate.
112
What distinguishes spyware from other types of malware like viruses or worms?
Answer:
Its primary goal is information gathering, not replication or damage.
While viruses and worms are focused on spreading and causing disruption, the main objective of spyware is to remain hidden and collect data about the user's activities, which is then sent back to the attacker.
113
Which of the following is NOT a feature of a modern antivirus or internet security suite?
Answer:
Hard drive defragmentation
Hard drive defragmentation is a system maintenance utility that organizes files on a hard drive to improve performance. While useful, it is not a security feature and is not typically part of an antivirus suite.
114
What is a "polymorphic" virus?
Answer:
A virus that changes its own code (mutates) to avoid detection by antivirus software.
Polymorphic malware constantly changes its identifiable features, such as its file name or encryption keys, to evade detection. This mutation makes it very difficult for signature-based antivirus scanners to identify.
115
A "keylogger" is a specific type of:
Answer:
Spyware
A keylogger is a form of spyware that records every keystroke a user makes on their keyboard. This is a common method for stealing passwords, credit card numbers, and other confidential information.
116
A "host-based" firewall protects:
Answer:
A single computer.
A host-based firewall is a software firewall installed on an individual computer (the "host"). It controls traffic for that specific machine, as opposed to a network firewall, which protects an entire network.
117
The "Operation Aurora" cyberattack, which was disclosed by Google in 2010, was a series of attacks that targeted high-tech US companies. This type of attack is known as an:
Answer:
Advanced Persistent Threat (APT).
Operation Aurora was a classic example of an APT, which is a prolonged and targeted cyberattack where an attacker gains access to a network and remains undetected for an extended period. The goal of an APT is typically espionage or data theft, not immediate disruption.
118
What kind of malware appears legitimate but performs malicious activity once run?
Answer:
Trojan horse
A Trojan horse disguises itself as a legitimate program but carries a malicious payload that executes when the program is run.
119
The Melissa virus (1999) was a fast-spreading macro virus that propagated via:
Answer:
An email attachment that, when opened, would mail itself to the first 50 people in the user's address book.
The Melissa virus was one of the first major email-borne threats to gain widespread attention. It used a simple but effective social engineering trick to get users to open a Word document, which then triggered a macro to email the virus to the user's contacts.
120
What is a key lesson learned from studying famous malware attacks?
Answer:
That keeping software patched and educating users about phishing are critical defenses.
A common thread through many of the most damaging malware outbreaks is the exploitation of unpatched vulnerabilities (WannaCry, Code Red) and the success of social engineering (ILOVEYOU, Melissa). This highlights the timeless importance of basic cyber hygiene, such as patching and user awareness.