Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
141
An email from an unknown sender contains a link with a shortened URL (e.g., bit.ly). What should you do?
Answer:
Assume the link is malicious and do not click it.
Given that the sender is unknown, the safest course of action is to assume the link is malicious and avoid clicking it altogether. While you can use a URL expander, the most secure approach is to not interact with unsolicited links from unknown sources.
142
What is "formjacking"?
Answer:
A cyberattack where criminals insert malicious code into an online form to steal the information that users enter.
Formjacking is a threat to online shoppers, where attackers compromise the payment page of a website to skim credit card details and other personal information in real-time as the user types it in.
143
Social engineering is best described as:
Answer:
The art of manipulating people into divulging confidential information.
Social engineering is a non-technical method of intrusion that relies on human interaction and psychological manipulation to trick people into breaking normal security procedures.
144
You see a link in a social media post that has been shortened using a service like bit.ly. What is a good practice before clicking it?
Answer:
Use a URL expander service to preview the full destination URL.
URL shorteners hide the true destination of a link. Using a URL expander tool (many are available online) will show you the full URL before you click, allowing you to check if it looks suspicious.
145
How can you back up your important files to protect them from ransomware?
Answer:
Both A and B are good backup strategies.
Having a recent backup of your files is the best defense against ransomware. The 3-2-1 backup rule (3 copies, on 2 different media, with 1 off-site) is a good guideline. Emailing files to yourself is not a robust backup solution.
146
A company's "clean desk" policy is a defense against what type of attack?
Answer:
Shoulder surfing and information theft
A clean desk policy, which requires employees to clear their desks of sensitive documents when they are not present, helps prevent casual information theft by visitors or unauthorized personnel, and also limits the effectiveness of shoulder surfing.
147
What is "spear phishing"?
Answer:
A phishing attack that targets a specific individual or organization
Spear phishing is a more targeted form of phishing where the attacker customizes the attack for a specific individual, company, or organization to make the fraudulent message seem more authentic and convincing.
148
Why is it a good idea to have different passwords for different online accounts?
Answer:
If one account is compromised, the attackers won't be able to access your other accounts.
This practice, known as avoiding password reuse, is a critical security measure. If you use the same password everywhere, a data breach at one website could lead to all of your online accounts being compromised.
149
Which cyberattack floods a network or website with excessive traffic to make it unavailable?
Answer:
DoS attack
A Denial-of-Service (DoS) attack aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
150
What is "shoulder surfing"?
Answer:
Looking over someone's shoulder to see their password or other sensitive information as they type it.
Shoulder surfing is a direct observation technique used to obtain information. It can be done in person or even from a distance using binoculars or hidden cameras.