Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
11
Which type of social engineering attack involves creating a fake website to trick users into entering credentials?
Answer:
Phishing
Phishing often involves creating spoofed websites that mimic legitimate ones to trick users into divulging sensitive information like login credentials. This is a common tactic in credential harvesting.
12
Which of the following is a key aspect of 'privacy impact assessment' (PIA)?
Answer:
Evaluating the potential privacy risks of a new project, system, or process and determining how to mitigate them
A Privacy Impact Assessment (PIA) is a process used to identify, assess, and mitigate privacy risks associated with the processing of personal data in a new project, system, or program. It's a proactive tool for ensuring privacy compliance.
13
The process of verifying the identity of a user or system is known as what?
Answer:
Authentication
Authentication is the process of verifying a user's identity to ensure they are who they claim to be. This is typically done with credentials like usernames and passwords, or through other methods like MFA or biometrics.
14
Which concept relates to ensuring data remains unaltered and accurate over time?
Answer:
Integrity
Integrity is the assurance that information is trustworthy and accurate. It means data has not been modified or destroyed in an unauthorized manner.
15
Which security principle ensures that a user cannot deny having performed an action?
Answer:
Non-repudiation
Non-repudiation ensures that a party cannot refute the validity of a statement or action. In cybersecurity, it provides irrefutable proof of origin or delivery of data. Digital signatures are a common method to achieve non-repudiation.
16
Which of the following best describes 'confidentiality' in cybersecurity?
Answer:
Ensuring data is accessible to authorized users only
Confidentiality, one of the three pillars of the CIA triad, ensures that information is not disclosed to unauthorized individuals, entities, or processes. It's about keeping sensitive data private.
17
What is ransomware?
Answer:
A type of malicious software that encrypts a victim's files, demanding a ransom payment to restore access
Ransomware is a major cybersecurity threat where attackers encrypt a victim's files, making them inaccessible. They then demand a payment, often in cryptocurrency, in exchange for the decryption key.
18
Which security control dictates that no single individual should be able to complete an entire critical or sensitive task alone?
Answer:
Separation of duties
Separation of duties is a critical internal control that divides tasks, ensuring that no single individual has complete control over a process. This helps prevent fraud, error, and abuse, as multiple people are required to complete a sensitive action.
19
What is the primary characteristic of a computer 'worm'?
Answer:
It is a standalone malicious program that replicates itself and spreads to other computers over a network without human intervention
Unlike viruses, worms are self-replicating malware that do not need to attach themselves to an existing program. They spread autonomously across networks, exploiting vulnerabilities to propagate.
20
What is the purpose of a 'security patch'?
Answer:
To fix bugs and security vulnerabilities in software
Security patches are updates released by software vendors to fix known vulnerabilities and bugs. Applying patches promptly is crucial for maintaining system security and preventing exploitation.