Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
What is the primary function of a 'honeypot' in network security?
Answer:
To act as a decoy system to attract and trap attackers, allowing for analysis of their techniques
A honeypot is a security mechanism designed to lure and trap cyber attackers. It's a decoy system, network, or data that appears legitimate but is isolated and monitored to gather information about attacker methods and activities.
22
What is 'data minimization' in the context of privacy?
Answer:
Collecting and processing only the personal data that is absolutely necessary for a specific purpose
Data minimization is a core principle of privacy regulations like GDPR. It advocates for collecting and storing only the data that is essential for a specific, stated purpose, reducing the risk in case of a breach.
23
Which of the following describes a 'keylogger'?
Answer:
Malware that records every keystroke made on a computer
A keylogger is a type of surveillance software that has the ability to record every keystroke made on the target computer. It is often used by attackers to steal passwords, credit card numbers, and other sensitive information.
24
What is the primary goal of cybersecurity?
Answer:
To protect systems and data from digital attacks
The primary goal of cybersecurity is to protect computer systems, networks, and data from digital attacks, damage, or unauthorized access. While confidentiality, integrity, and availability (CIA triad) are key principles, the overarching goal is the comprehensive protection against threats.
25
What is considered a 'supply chain attack' in cybersecurity?
Answer:
An attack that targets less secure elements in the supply chain to gain access to the main target
A supply chain attack targets organizations by compromising a weaker link in their supply chain, such as a trusted third-party vendor or software component. By injecting malicious code or exploiting vulnerabilities in these components, attackers gain access to the main target.
26
Which of the following is an example of strong password practice?
Answer:
Using a combination of uppercase and lowercase letters, numbers, and symbols
Strong passwords are long, complex, and unique. They incorporate a mix of character types (uppercase, lowercase, numbers, symbols) to make them difficult to guess or crack.
27
What does 'integrity' refer to in the context of cybersecurity?
Answer:
Maintaining the accuracy, consistency, and trustworthiness of data over its entire lifecycle
Integrity, another component of the CIA triad, ensures that data has not been altered or destroyed in an unauthorized manner. It means the data is accurate, complete, and reliable.
28
What is a 'brute-force attack' in the context of password cracking?
Answer:
An attack that attempts to guess a password by systematically trying every possible combination of characters until the correct one is found
A brute-force attack is a trial-and-error method used by applications to decode encrypted data, such as passwords or decryption keys. It involves systematically checking all possible combinations until the correct one is found.
29
Which body typically sets industry standards for information security, often used for certification?
Answer:
ISO (International Organization for Standardization)
The International Organization for Standardization (ISO) develops various standards, including those for information security management systems (e.g., ISO/IEC 27001). These standards provide a framework for organizations to manage and protect their information assets.
30
What is the purpose of a firewall?
Answer:
To filter network traffic and block unauthorized access
A firewall acts as a barrier between a trusted internal network and untrusted external networks (like the internet), controlling inbound and outbound network traffic based on predefined security rules.