Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
11
Is it possible for a phishing attack to be carried out in person?
Answer:
Yes, but it is very rare and is more accurately described as social engineering.
While phishing is predominantly an online activity, the principles of deception and impersonation can be applied in person. However, this is more broadly categorized under the umbrella of social engineering.
12
What is "spyware"?
Answer:
A type of malicious software that secretly gathers information about a person or organization and sends it to another entity.
Spyware is a form of malware that is designed to be hidden and to monitor your activity, log your keystrokes, and collect sensitive information like passwords and credit card numbers.
13
What is a "typosquatting" or "URL hijacking" website?
Answer:
A website that intentionally uses a common misspelling of a popular website's name to trick users.
Typosquatting relies on users making common typing errors when entering a URL. Scammers register these misspelled domains and set up fake websites to steal information or spread malware.
14
Why is it important to have antivirus software installed and kept up to date?
Answer:
It can detect and remove most known types of malware.
Antivirus software is a fundamental security tool that scans your computer for malware and helps to protect you from infection. It is crucial to keep it updated so it can recognize the latest threats.
15
Phishing that occurs through pop-up ads on websites is known as:
Answer:
All of the above
Malvertising, pop-up phishing, and ad phishing all refer to the use of malicious advertisements, often in the form of pop-ups, to trick users into visiting phishing websites or downloading malware.
16
What is a major risk of using out-of-date software (e.g., an old web browser or operating system)?
Answer:
It may have unpatched security vulnerabilities that hackers can exploit.
Software updates frequently include patches for newly discovered security flaws. Running old software is like leaving a door unlocked for hackers, as it may contain known vulnerabilities that can be easily exploited to install malware or steal data.
17
What is a key sign of a "charity scam"?
Answer:
The charity pressures you to donate immediately.
Legitimate charities will welcome your donation whenever you choose to make it. Scammers often create a sense of urgency to prevent you from researching the charity and discovering it is fake.
18
What is a "romance scam"?
Answer:
A scam where someone pretends to be in love with the victim to gain their trust and then asks for money.
In a romance scam, fraudsters create fake profiles on dating sites or social media and build an emotional connection with their targets over time, eventually fabricating a story and asking for money.
19
What is "reverse social engineering"?
Answer:
When an attacker creates a situation where the victim initiates contact with them for "help."
In reverse social engineering, the attacker first sabotages something (e.g., corrupts a user's file) and then positions themselves as the person who can fix the problem, causing the victim to come to them and willingly offer up information.
20
What is "baiting" in the context of social engineering?
Answer:
All of the above.
Baiting uses the promise of an item or good to entice victims. This can be a physical object like a USB drive or a digital item like a free movie download, all with the goal of tricking the user into compromising their security.