Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
151
The "3-2-1 backup rule" is a recommended strategy that means:
Answer:
Have at least 3 copies of your data, on 2 different types of media, with 1 copy kept off-site.
The 3-2-1 rule is a robust and resilient backup strategy. It ensures that you have redundant copies of your data (3 copies) on different storage types (2 media, e.g., hard drive and cloud) and protects against localized disasters like fire or theft (1 off-site copy).
152
What type of malware changes its form each time it is installed to evade antivirus detection?
Answer:
Polymorphic virus
A polymorphic virus is a complex type of malware that can change its underlying code and signature patterns with each new infection. This constant mutation makes it very difficult for signature-based antivirus software to detect and remove.
153
The ultimate effectiveness of any antivirus tool depends on:
Answer:
The user's safe browsing habits and security awareness.
Antivirus software is a critical tool, but it is not a substitute for user vigilance. Safe practices, such as not opening suspicious attachments, avoiding shady websites, and thinking before you click, are just as important for preventing malware infections.
154
What type of malware is specifically designed to secretly observe a user's activities and collect their sensitive information?
Answer:
Spyware
Spyware is a category of malware designed to gather information about a person or organization without their knowledge. It can record keystrokes (keylogging), capture screenshots, and harvest login credentials or credit card numbers.
155
What is the primary function of antivirus software?
Answer:
To detect, prevent, and remove malicious software.
Antivirus (AV) software is a security utility designed to protect a computer system from malware. Its core function is to scan for, identify, and then either quarantine or delete malicious code.
156
What is a "rootkit"?
Answer:
A collection of software tools that enables an unauthorized user to gain control of a computer system without being detected.
A rootkit is a particularly dangerous type of malware designed to be hidden from the user and the operating system. It allows an attacker to maintain privileged, "root-level" access to a computer while actively hiding its presence.
157
Using a firewall is a malware prevention technique because it can:
Answer:
Block unauthorized access to and from your computer over the network.
A firewall acts as a gatekeeper for your network connection. It can prevent malware from getting into your system from the internet and can also block an existing infection from sending your data out to an attacker.
158
An "air-gapped" computer is one that:
Answer:
Is physically isolated and not connected to any network, including the internet.
An air gap is an extreme security measure where a computer or network is physically disconnected from all other networks to prevent remote attacks. This technique is used for highly sensitive systems, such as those controlling critical infrastructure.
159
A "false positive" in an antivirus scan occurs when:
Answer:
The antivirus incorrectly identifies a legitimate, harmless file as malware.
A false positive is a false alarm. It happens when the antivirus software, often through heuristic analysis, mistakenly flags a safe file as malicious. This can sometimes cause problems if a critical system file is quarantined.
160
Ultimately, the best malware prevention strategy is:
Answer:
A layered defense-in-depth approach that combines technical controls (antivirus, firewall) with user education and good practices.
There is no single "magic bullet" for security. An effective strategy uses multiple layers of defense. If one layer fails, another may still stop the attack. This combination of technology, processes, and people provides the most robust protection.