Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
161
Why is it a good security practice to review your online account's privacy settings regularly?
Answer:
All of the above.
Regularly reviewing and tightening your privacy settings helps to control your digital footprint. Limiting the amount of information you share publicly makes you a less attractive and more difficult target for social engineers and other attackers.
162
What is the "allow list" or "whitelist" feature in a security tool?
Answer:
A list of programs or files that you have designated as safe and should be ignored by the scanner.
The allow list is used to tell your antivirus or security software not to scan or block specific items that you know are safe. This is useful for preventing false positives on legitimate software that may exhibit unusual behavior.
163
Which malicious programs replicate themselves while consuming storage space?
Answer:
Computer Worms
Worms self-replicate and spread across networks, often degrading system performance by using up resources.
164
An Endpoint Detection and Response (EDR) tool is more advanced than traditional antivirus because:
Answer:
It continuously monitors and records endpoint and network events to detect suspicious activity in real-time.
EDR solutions provide a deeper level of security by not just looking for known malware, but by monitoring for unusual behavior and providing tools for threat hunting and incident response, offering better protection against advanced persistent threats.
165
A type of malware that infects the master boot record (MBR) of a hard drive is known as a:
Answer:
Boot sector virus.
A boot sector virus is a type of virus that infects the boot record of a hard disk or floppy disk. This allows the virus to load into memory before the operating system even starts, making it very difficult to detect and remove.
166
An anti-exploit program is designed to:
Answer:
Prevent attackers from taking advantage of software vulnerabilities.
Anti-exploit technology is a proactive defense that focuses on blocking the techniques used to exploit software vulnerabilities, rather than trying to identify the malware itself. This can stop zero-day attacks that traditional antivirus might miss.
167
A sudden and unexplained increase in your computer's internet data usage could be a symptom of:
Answer:
Your computer being part of a botnet and communicating with a command-and-control server.
If your computer is part of a botnet, it will communicate with the attacker's server to receive commands and send back data. This activity can lead to a noticeable spike in network traffic and data consumption.
168
What term describes a self-replicating program, likened to a virus and inspired by a 1970s science fiction work?
Answer:
Worm
A computer worm is a standalone malware program that replicates itself to spread to other computers. Unlike a virus, it does not need to attach itself to an existing program. The term was inspired by the 1975 sci-fi novel "The Shockwave Rider" by John Brunner.
169
Why does changing default passwords on devices like routers and IoT cameras enhance security?
Answer:
Attackers have lists of default passwords for thousands of devices and use them to easily gain access.
Many devices ship with well-known, default administrative credentials (like "admin"/"password"). Attackers use automated scripts to scan the internet for devices still using these defaults. Changing them to a strong, unique password is one of the most critical first steps in securing a new device.
170
Which term describes malicious software disguised as a legitimate program?
Answer:
Trojan Horse
Trojans mislead users by appearing safe while hiding harmful code or unauthorized access tools.