Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
131
What is "domain spoofing"?
Answer:
All of the above.
Domain spoofing encompasses several techniques used to deceive users about the origin of a communication or the identity of a website, including using similar-looking domain names and forging email sender addresses.
132
What is the "Internet of Things" (IoT)?
Answer:
A network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, and sensors that allows them to connect and exchange data.
The IoT refers to the vast network of everyday objects that are connected to the internet. While offering convenience, these devices can also pose security and privacy risks if they are not properly secured.
133
What is a good way to verify if a website is the official site for a company?
Answer:
Search for the company on a search engine and use the link from the search results.
One of the safest ways to find a legitimate website is to use a trusted search engine and click on the official link from the search results, rather than relying on links from unsolicited emails or messages.
134
What is a potential danger of "geotagging" your photos on social media?
Answer:
It can reveal your exact location, including your home address, to the public.
Geotagging embeds location data into a photo's metadata. Sharing these photos publicly can inadvertently reveal sensitive information about your whereabouts and daily routines, which could be exploited by criminals.
135
An attacker rummages through a company's trash to find discarded documents with sensitive information. This technique is called:
Answer:
Dumpster diving
Dumpster diving is the practice of searching through trash for discarded items that may contain valuable information, such as old bills, memos, or even password lists.
136
A user receives an email that looks like it's from a file-sharing service, with a link to a shared document. The link leads to a fake login page. This is an example of:
Answer:
Phishing
This is a common phishing technique that uses the guise of a familiar service to trick the user into entering their login credentials on a fraudulent page.
137
The single most important practice for staying safe online is:
Answer:
Being cautious, skeptical, and thinking before you click.
While technology and tools are helpful, the human factor is the most critical element of cybersecurity. A vigilant and educated user who questions what they see online is the best defense against the vast majority of threats.
138
You receive an email with a link to reset your password. The link text is "[https://your-email-provider.com/reset](https://www.google.com/search?q=https://your-email-provider.com/reset)", but when you hover over it, the actual URL is "[http://hacker-site.ru](https://www.google.com/search?q=http://hacker-site.ru)". This is a red flag for:
Answer:
A phishing attack.
The discrepancy between the link text and the actual destination URL is a classic sign of a phishing attempt. The attacker is trying to make the link look legitimate while actually sending you to a malicious site.
139
A social engineering attack that happens slowly over a long period is known as:
Answer:
All of the above
Not all social engineering attacks are quick. Some attackers will take weeks or months to slowly build a relationship and gain a target's trust before they make their move. These are often referred to as slow-burn or long-con attacks.
140
Before connecting to a public Wi-Fi network, you should:
Answer:
All of the above.
It is important to verify that you are connecting to the legitimate Wi-Fi network and not a fake "honeypot" network set up by an attacker. Turning off file sharing and using a VPN are additional layers of protection.