Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
An SQL Injection (SQLi) attack targets what component of a web application?
Answer:
The back-end database.
SQL Injection attacks exploit vulnerabilities in how a web application handles user input. By "injecting" malicious SQL code into a web form (like a search bar or login field), an attacker can manipulate the application's database to view, modify, or delete data.
22
The concept of "Privacy by Design" means that:
Answer:
Privacy and data protection should be embedded into the design and architecture of systems and business practices from the very beginning.
Privacy by Design is a core principle of GDPR. It is a proactive, not reactive, approach that calls for privacy to be a fundamental component in the design and development of any new product, service, or process that involves personal data.
23
An attacker attempts to gain access to an account by systematically trying every possible password combination. This is a:
Answer:
Brute-force attack
A brute-force attack is a trial-and-error method used to crack passwords or encryption keys. The attacker uses automated software to try a massive number of consecutive guesses until the correct one is found.
24
What is deep packet inspection (DPI)?
Answer:
An advanced method of examining the content (payload) of a data packet, not just its header.
Unlike basic packet filtering, which only looks at header information (IP addresses, ports), DPI looks inside the data portion of the packet. This allows a firewall or IPS to identify specific applications, detect malware signatures, or prevent sensitive data from leaving the network.
25
A one-time password (OTP) sent via an SMS text message to your phone is primarily leveraging which factor?
Answer:
Possession
While you must *know* the code, the security relies on the assumption that you are the only one in *possession* of the specific mobile phone and SIM card that can receive the SMS message.
26
What is a "replay attack"?
Answer:
An attack where a valid data transmission is maliciously or fraudulently repeated or delayed.
In a replay attack, an attacker intercepts a data packet (e.g., a login request with credentials) and then "replays" it later to the server to impersonate the legitimate user. Encryption and session tokens are used to prevent this type of attack.
27
What type of attack involves an attacker making a large number of DNS requests to a public DNS server but spoofing the source IP address to be the victim's IP?
Answer:
DNS amplification attack
This is a type of DDoS attack. The attacker sends a small query to a DNS server but crafts it in a way that elicits a much larger response. By spoofing the source IP, all these large responses are sent to the victim, overwhelming their network with traffic.
28
Which cryptographic technique involves transforming data into an unreadable format to prevent unauthorized access?
Answer:
Encryption
Encryption is the process of converting readable data (plaintext) into an unreadable, encoded form (ciphertext) using a cryptographic algorithm and a key. This transformation ensures that only authorized individuals, who possess the correct decryption key, can revert the ciphertext back into its original, readable form. Its primary purpose is to secure data during transmission or storage, protecting its confidentiality from unauthorized interception or access. Decryption is the reverse process, while hashing creates a fixed-size string of characters from data for integrity checks, and digital signatures verify the authenticity and integrity of a digital message or document.
29
A "host-based" IDS (HIDS) is designed to monitor what?
Answer:
The characteristics of a single computer system, including system logs and file integrity.
A host-based IDS is installed on a specific host (like a server or workstation). It focuses on the internal activities of that machine, looking for signs of compromise such as changes to critical system files, suspicious processes, or unauthorized login attempts.
30
The HTTPS protocol in your web browser's address bar uses what to encrypt traffic between your browser and the website?
Answer:
A combination of symmetric and asymmetric encryption (TLS/SSL).
HTTPS uses Transport Layer Security (TLS), formerly SSL. TLS uses asymmetric encryption (like RSA) for the initial "handshake" to securely exchange a symmetric key. It then uses the much faster symmetric encryption (like AES) to encrypt the actual data for the rest of the session.