Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
A "vulnerability scanner" is a tool that:
Answer:
Scans a computer or network for known security weaknesses that malware could exploit.
A vulnerability scanner proactively looks for security holes, such as out-of-date software or misconfigurations, that could serve as an entry point for malware. It helps you patch weaknesses before they are exploited.
22
Which virus infects 32-bit Windows 95/98/NT executable files?
Answer:
Chernobyl virus
The Chernobyl virus (also known as CIH or Spacefiller) was a notorious computer virus that specifically targeted executable files on Windows 9x-based operating systems. It was highly destructive, capable of erasing the hard drive and overwriting the system's BIOS.
23
Your friends tell you they are receiving strange emails from your email account that you did not send. This could be a sign that:
Answer:
Your email account has been compromised or your computer is infected with malware.
A common behavior of some malware is to hijack a user's email account or email client to send copies of itself to everyone in the user's contact list, thus propagating the infection.
24
To prevent malware, it's a good practice to review the permissions an app requests before installing it. You should be suspicious if:
Answer:
A simple calculator app asks for permission to access your contacts, microphone, and location.
You should always apply the principle of least privilege to app permissions. An app should only have access to the resources it absolutely needs to function. A calculator app has no legitimate reason to access your contacts or microphone, which is a major red flag.
25
You have downloaded an anti-malware tool called "VirusScanner.exe" from a pop-up ad. When you run it, it claims to find hundreds of viruses and asks for payment to remove them. This tool is likely:
Answer:
A "rogue" security software, which is a form of malware itself.
This is a classic rogue security software or scareware scam. The software itself is the malware; it provides fake scan results and uses fear to trick the user into paying for a useless product, often while installing other malware in the background.
26
A Trojan that creates a botnet is often called a:
Answer:
Zombie
A computer that has been infected with malware and has become part of a botnet is often referred to as a "zombie" or "bot." It sits dormant until it receives commands from the "botmaster" who controls the network.
27
Which computer virus records every movement you make on your computer?
Answer:
Keylogger
A keylogger is a type of spyware that records every keystroke a user makes, often to steal login credentials and sensitive data.
28
What is a "botnet"?
Answer:
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
A botnet is a collection of internet-connected devices, which may include PCs, servers, and mobile devices, that are infected and remotely controlled by a common type of malware. They are often used to launch large-scale attacks like DDoS attacks.
29
Why do many malware infections go unnoticed by the average user for a long time?
Answer:
Modern malware, like spyware and rootkits, is designed to be as stealthy as possible to avoid detection.
The goal of many types of malware is to remain on a system for as long as possible to continue stealing data or using the computer's resources. To achieve this, they are designed to be stealthy, operating in the background and avoiding any obvious symptoms.
30
Your computer's firewall alerts you that a program you don't recognize is trying to access the internet. This could be:
Answer:
Malware attempting to "phone home" to its command-and-control server.
A key function of a firewall is to monitor and control network traffic. An alert about an unknown program trying to make an outbound connection is a significant red flag that malware may be trying to send stolen data or receive instructions from an attacker.