Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
11
What is a Time-based One-Time Password (TOTP)?
Answer:
A password that is based on the current time and is only valid for a short period (e.g., 30-60 seconds).
TOTP algorithms, used by most authenticator apps, generate a new code at a fixed interval (usually 30 seconds) based on a shared secret key and the current time. This ensures that each code is unique and expires quickly.
12
What is a key difference between a "data controller" and a "data processor" under GDPR?
Answer:
The controller determines the purposes and means of processing personal data, while the processor processes data on behalf of the controller.
The controller is the entity that decides *why* and *how* personal data should be processed (e.g., the company collecting customer data). The processor is a separate entity that carries out the processing on the controller's instructions (e.g., a third-party cloud provider storing the data).
13
What is the "non-repudiation" property provided by digital signatures?
Answer:
It ensures that the sender of a message cannot later deny having sent the message.
Non-repudiation provides proof of origin. Because a digital signature can only be created with the sender's unique private key, it serves as undeniable proof that the sender was the one who signed and sent the message.
14
What is a "backup code" in the context of MFA?
Answer:
A set of single-use codes provided when you set up MFA, which you can use to log in if you lose access to your second factor.
When you enable MFA, most services will provide you with a list of 8-10 backup codes. It is crucial to store these codes in a safe place (e.g., a password manager or a safe) so you can regain access to your account if you lose your phone.
15
What is the primary purpose of a digital signature?
Answer:
To provide authenticity, integrity, and non-repudiation for a digital message.
A digital signature, created using the sender's private key, proves that the message was sent by the claimed sender (authenticity), that the message has not been altered (integrity), and that the sender cannot deny sending it (non-repudiation).
16
What is "Personally Identifiable Information" (PII)?
Answer:
Any information that can be used to identify a specific individual.
PII is a broad term for any data that could be used, on its own or in combination with other information, to identify, contact, or locate a single person. This can include a name, social security number, email address, or even an IP address in some contexts.
17
Biometric authentication (like Face ID) is convenient, but what is a potential drawback?
Answer:
Biometric data, if stolen, cannot be changed like a password.
The primary concern with biometrics is that if a database containing your fingerprint or facial scan data is breached, you cannot simply "reset" your face or fingerprint. This makes the secure storage and handling of biometric data critically important.
18
A "Next-Generation Firewall" (NGFW) typically includes what advanced capability?
Answer:
All of the above.
NGFWs go beyond traditional port and protocol inspection. They are "application-aware," meaning they can identify and control specific applications (like Facebook or Dropbox), perform deep packet inspection to look for threats within the data itself, and often have built-in IPS capabilities.
19
What property of a hash function ensures that it is extremely difficult to find two different inputs that produce the same hash output?
Answer:
Collision resistance
Collision resistance is a critical property of a secure hash function. It should be computationally infeasible for anyone to find two distinct inputs, `x` and `y`, such that `hash(x) = hash(y)`.
20
Using your fingerprint to unlock your smartphone is an example of which authentication factor?
Answer:
Inherence
The inherence factor refers to any biological trait unique to an individual. This includes biometrics like fingerprints, facial scans, iris scans, or voice patterns.