Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
171
The Stuxnet worm exploited several "zero-day" vulnerabilities. What does this mean?
Answer:
It exploited security flaws that were unknown to the software vendors and the public at the time.
The use of multiple zero-day exploits was a key factor in Stuxnet's sophistication and success. It meant that even fully patched and up-to-date systems were vulnerable to the attack, as no defense existed for these unknown flaws.
172
The Emotet malware is a particularly dangerous threat because it often acts as a "dropper" or delivery network for what?
Answer:
Other types of malware, including banking Trojans and ransomware.
Emotet is a sophisticated and resilient botnet that is often used as a Malware-as-a-Service (MaaS) platform. An initial Emotet infection is frequently followed by a second-stage payload, such as the TrickBot banking Trojan or the Ryuk ransomware.
173
How can disabling macros in Microsoft Office help prevent malware?
Answer:
It can stop macro viruses from running automatically when a malicious document is opened.
Macro viruses are a major infection vector. By default, modern versions of Office disable macros and warn you before enabling them. Keeping them disabled and only enabling them for fully trusted documents is a critical security measure.
174
The "ILOVEYOU" worm, which spread rapidly in 2000, used what social engineering tactic as its primary infection vector?
Answer:
It came in an email with the subject line "ILOVEYOU" and an attachment that appeared to be a love letter.
The ILOVEYOU worm was a classic example of social engineering. It preyed on human curiosity and emotion by masquerading as a love letter from a contact, tricking millions of people into opening the malicious VBScript attachment.
175
The WannaCry attack in 2017 was a large-scale outbreak of what type of malware?
Answer:
Ransomware
WannaCry was a ransomware cryptoworm that encrypted files on infected Windows computers and demanded a ransom payment in Bitcoin. It caused massive disruptions to organizations worldwide, including the UK's National Health Service (NHS).
176
What type of malware appears to be a legitimate program but also enables malicious activities?
Answer:
Trojan horse
A Trojan horse, or Trojan, is a type of malware that is disguised as legitimate software. Users are tricked into loading and executing it on their systems. Once activated, it can enable unauthorized access to the victim's computer, steal data, or install other malware.
177
Which of the following is a common symptom of a computer infected with malware?
Answer:
All of the above.
Malware can cause a wide range of problems. It can consume system resources, causing slowdowns; interfere with normal operations, causing crashes; and display unwanted ads, among many other symptoms.
178
What is the purpose of Heuristic checking in computer security?
Answer:
Virus scanning
Heuristic checking, or heuristic analysis, is a method used by antivirus software to detect new, unknown viruses or new variants of existing viruses. Instead of looking for specific known signatures, it scans for suspicious characteristics and behaviors common to malicious code, making it a key part of virus scanning.
179
The primary difference between a virus and a worm is that a virus requires _____, while a worm does not.
Answer:
a host program to attach to
The key differentiator is that a virus is a parasitic piece of code that needs a host file to live in and spread. A worm is a self-contained program that can spread on its own across networks without needing a host.
180
You receive an email that appears to be from your bank, but the sender's email address is misspelled and the grammar is poor. The best prevention technique is:
Answer:
Recognize these red flags, trust your instincts, and delete the email without interacting with it.
This is a clear phishing attempt. Being able to recognize the common signs of a scam—such as poor spelling, a sense of urgency, and suspicious sender details—is a fundamental skill for malware prevention. Never use contact information provided in a suspicious email to verify it.