Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
The best defense against phishing is:
Answer:
User awareness and skepticism
While technical defenses like antivirus and firewalls are important, the most effective defense against phishing is a vigilant and educated user who can recognize the signs of a phishing attempt and knows not to click on suspicious links or open strange attachments.
22
A website's domain name is "paypal.com.secure-login.net". What is the actual domain you are connecting to?
Answer:
secure-login.net
The main domain is the part of the URL immediately before the top-level domain (e.g., .com, .net, .org). In this case, "secure-login.net" is the actual domain, and "paypal.com" is just a subdomain designed to trick you.
23
What is a "firewall"?
Answer:
A network security system that monitors and controls incoming and outgoing network traffic.
A firewall acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. It helps to block unauthorized access to your computer or network.
24
Which of the following is a psychological principle often used in social engineering?
Answer:
All of the above
Social engineers use many psychological triggers, including pretending to be a person in authority (like a manager or police officer), intimidating the victim, or creating a false sense of scarcity (e.g., "this offer is only available for the next 10 minutes").
25
What is "ransomware"?
Answer:
A type of malware that encrypts your files and demands a ransom payment to restore access.
Ransomware is a particularly nasty form of malware that can lock you out of your own data. The attackers demand payment, often in cryptocurrency, in exchange for a decryption key.
26
Why is it a good practice to log out of websites when you are finished using them, especially on a public computer?
Answer:
To prevent someone else from accessing your account.
If you simply close the browser tab without logging out, your session may remain active. The next person to use the computer could potentially access your account just by visiting the same website.
27
Why is it a bad idea to enter personal information on a website that does not use HTTPS?
Answer:
Your information can be easily intercepted by third parties.
Without HTTPS, the data you send to the website (like passwords or credit card numbers) is transmitted in plain text, which means it can be easily read by anyone who intercepts the traffic between your computer and the server.
28
The most reliable way to get to a website is to:
Answer:
Type the website address directly into your browser's address bar.
Typing the address yourself or using a trusted bookmark that you created are the most secure ways to ensure you are visiting the legitimate website and not a fake one from a phishing link.
29
What is "information gathering" in the context of a social engineering attack?
Answer:
The first phase of an attack, where the attacker researches the target.
Before launching an attack, a social engineer will spend time gathering information about their target (individual or organization) from public sources like company websites, social media, and news articles to make their approach more convincing.
30
What is identity theft?
Answer:
When someone uses your personal information without your permission to commit fraud.
Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized purchases or applying for loans.