Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
121
A "pump and dump" scheme is a type of fraud common in:
Answer:
The stock market and cryptocurrency markets.
Pump and dump is a type of securities fraud that involves artificially inflating the price of a stock or cryptocurrency (the "pump") through false and misleading positive statements, in order to sell the cheaply purchased assets at a higher price (the "dump").
122
What is a VPN (Virtual Private Network)?
Answer:
A secure, encrypted connection over a public network.
A VPN creates a secure "tunnel" for your internet traffic, encrypting your data and hiding your IP address. This enhances your privacy and security, especially when using public Wi-Fi.
123
Which of the following URLs is most likely a phishing link trying to impersonate the legitimate site "mybank.com"?
Answer:
[http://login.mybank.com.security-update.com](https://www.google.com/search?q=http://login.mybank.com.security-update.com)
This URL is designed to be deceptive. The true domain is "security-update.com," not "mybank.com." The subdomains "https://www.google.com/search?q=login.mybank.com" are added to trick the user into thinking the site is legitimate.
124
What does the term "cyber hygiene" refer to?
Answer:
A set of practices and steps that users of computers and other devices can take to maintain system health and improve online security.
Cyber hygiene involves routine practices, much like personal hygiene, that help keep you safe online. This includes using strong passwords, updating software, and being cautious about suspicious links and attachments.
125
What is a "drive-by download"?
Answer:
The unintentional download of software onto a computer, which can happen just by visiting a compromised website.
A drive-by download is a serious threat where a user can get malware on their system simply by loading a malicious webpage, without having to click on anything or approve a download.
126
An email link looks like this: "[http://www.mybank.com@192.168.1.1](https://www.google.com/search?q=http://www.mybank.com%40192.168.1.1)". Where does this link actually go?
Answer:
The IP address 192.168.1.1
The "@" symbol in a URL can be used to pass authentication credentials, but in this context, it's a trick. The browser will ignore everything before the "@" symbol and will attempt to connect to the IP address that follows it.
127
An attacker who creates a fake social media profile of a company executive to trick employees into revealing sensitive information is conducting what type of attack?
Answer:
Whaling
Whaling is a specific type of spear phishing attack that targets high-profile employees, such as senior executives or C-level managers, to steal sensitive information.
128
Before donating to a charity, you should:
Answer:
Research the charity using a reputable watchdog organization (like Charity Navigator).
It is important to do your own research to ensure that a charity is legitimate and that your donation will be used effectively. Independent charity evaluators are a good resource for this.
129
A fake website often has a sense of "wrongness" about it, with slightly off colors, logos, or fonts. This is because:
Answer:
It is difficult to perfectly replicate a professional website.
While scammers try to make their fake sites look convincing, it is very hard to perfectly copy every detail of a professionally designed website. Small inconsistencies in branding, design, and layout are often giveaways.
130
"Honeytrap" is a social engineering tactic where an attacker:
Answer:
Uses a fake online persona to start a romantic relationship with a target to extract information.
A honeytrap involves using a romantic or sexual relationship, often initiated online, as a means to manipulate a target into revealing confidential information or performing certain actions.