Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
131
What is the most common reason for a ransomware infection in a corporate environment?
Answer:
A phishing email that tricks an employee into opening a malicious attachment or link.
for a ransomware infection in a corporate environment?
132
A "sandbox" is a security mechanism that:
Answer:
Isolates and runs a suspicious program in a secure, controlled environment to see what it does.
Sandboxing is a technique used by some antivirus tools to test a potentially malicious file. The file is executed in an isolated virtual environment where it cannot harm the actual operating system, allowing the AV to observe its behavior safely.
133
In the context of the WannaCry attack, what role did security researcher Marcus Hutchins play?
Answer:
He discovered an effective "kill switch" that significantly slowed the initial outbreak of the worm.
Marcus Hutchins, also known as "MalwareTech," accidentally discovered a kill switch in WannaCry's code. The malware was programmed to check if a specific, unregistered domain name was active. Hutchins registered the domain, which caused many instances of the worm to stop spreading.
134
Why is ransomware considered a particularly challenging problem for businesses?
Answer:
All of the above.
Ransomware is a triple threat to businesses: it causes significant operational downtime, there is no guarantee that paying the ransom will be successful, and a single infection can quickly paralyze an entire corporate network.
135
A computer \_\_ is a program that attaches to files, reproduces, and spreads to other files.
Answer:
Virus
A computer virus is a type of malware that, when executed, replicates by inserting copies of itself into other computer programs or files.
136
What was the significance of the Morris Worm, released in 1988?
Answer:
It was one of the first computer worms to be distributed via the Internet and gain significant mainstream media attention.
The Morris Worm is considered one of the pioneers of internet worms. While not intentionally malicious, a flaw in its code caused it to spread far more aggressively than intended, infecting a large portion of the early internet and highlighting the need for better network security.
137
What is a "dropper"?
Answer:
A type of malware that is designed to install other malware onto a target system.
A dropper is a kind of Trojan that has been designed to "drop" or install other malicious files onto a victim's machine. The dropper itself may not be malicious, but it is the carrier for a harmful payload.
138
Why should you be cautious about using public USB charging ports (e.g., in airports or cafes)?
Answer:
They could be compromised for "juice jacking," where malware is installed or data is stolen from your device via the USB connection.
A USB connection can transfer both power and data. Attackers can modify public charging stations to exfiltrate data from or install malware on any device that is plugged in. It's safer to use your own AC power adapter or a power-only USB cable.
139
If your antivirus software suddenly becomes disabled and you cannot re-enable it, this could be a sign that:
Answer:
A sophisticated malware is on your system and has disabled the antivirus to protect itself.
Many types of advanced malware are specifically designed to neutralize security software as a first step after infection. This allows the malware to operate without being detected or removed.
140
How can network segmentation improve security and prevent the spread of malware?
Answer:
All of the above.
Network segmentation is a crucial architectural security control. By separating a network into zones (e.g., guest Wi-Fi, corporate LAN, R&D), a company can limit the "blast radius" of a malware outbreak, containing it to a single segment.