Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
121
What is the primary purpose of ransomware?
Answer:
To encrypt a user's files and demand a payment for the decryption key.
Ransomware is a form of malware that encrypts the victim's files, making them inaccessible. The attacker then demands a ransom, usually in cryptocurrency, in exchange for the key needed to decrypt the files.
122
Why is it a bad idea to enable remote desktop access (RDP) on a computer and expose it directly to the internet?
Answer:
RDP is a common target for attackers who scan the internet for open RDP ports to launch brute-force or exploit attacks.
Exposing RDP directly to the internet is extremely risky and a common vector for ransomware attacks. If remote access is needed, it should be secured behind a VPN and protected with strong passwords and multi-factor authentication.
123
Adware is a type of malware that:
Answer:
Automatically displays or downloads unwanted advertising material.
Adware, short for advertising-supported software, is a type of malware that bombards a user with pop-up ads. While sometimes just an annoyance, it can also track browsing habits and, in some cases, act as a gateway for more malicious software.
124
The Zeus (or Zbot) malware, first identified in 2007, is a Trojan horse that primarily targets victims to:
Answer:
Steal online banking information.
Zeus is one of the most famous and successful banking Trojans ever created. It is used to infect computers and steal financial information through methods like keylogging and form grabbing, and it has been used to steal hundreds of millions of dollars.
125
What kind of software detects and removes viruses?
Answer:
Antivirus
Antivirus software scans systems for harmful code and eliminates it to maintain security.
126
Files on your computer have been renamed with a strange extension, and you can no longer open them. A text file has appeared on your desktop demanding payment. This is a clear sign of:
Answer:
Ransomware.
The two key symptoms described—the encryption of files (making them inaccessible) and the appearance of a ransom note demanding payment—are the defining characteristics of a ransomware attack.
127
A "web application firewall" (WAF) is a specific type of firewall that:
Answer:
Sits in front of a web server to protect it from common web-based attacks.
A WAF is a specialized security tool designed to protect web applications by filtering and monitoring HTTP traffic between the application and the internet. It can help prevent attacks that target vulnerabilities in the website's code.
128
A "blended threat" is a type of malware attack that:
Answer:
Combines the characteristics of multiple types of malware, such as a worm, Trojan, and virus, into one attack.
A blended threat uses multiple attack vectors and malware types to maximize its severity and rate of infection. For example, it might use a worm to spread and a Trojan payload to create a backdoor on infected systems.
129
How does a "Remote Access Trojan" (RAT) work?
Answer:
It gives an attacker complete control over the victim's computer through a backdoor.
A RAT is a specific type of Trojan that provides an attacker with full remote control over the infected machine. They can access files, turn on the webcam, log keystrokes, and essentially do anything the legitimate user can do.
130
If your web browser's homepage and default search engine have been changed without your permission, you are likely infected with:
Answer:
A browser hijacker.
A browser hijacker is a type of malware that modifies a web browser's settings without the user's permission, to inject unwanted advertising into the user's browser or to redirect them to specific websites.