Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
Which of the following is a common method for mitigating a Distributed Denial of Service (DDoS) attack?
Answer:
Using scrubbing centers to filter malicious traffic and allow legitimate traffic through.
DDoS mitigation services often employ scrubbing centers, which are specialized data centers equipped to absorb and filter large volumes of malicious traffic. They analyze incoming traffic, remove the attack traffic, and forward only legitimate requests to the target server.
22
What is the main purpose of Multiprotocol Label Switching (MPLS) in modern networks?
Answer:
To provide a mechanism for high-performance data forwarding across networks by assigning labels to data packets.
MPLS is a data-carrying mechanism that speeds up network traffic flow and makes it easier to manage. It assigns short path labels to network packets, avoiding complex routing table lookups and enabling faster and more efficient forwarding, especially in large enterprise networks and ISPs.
23
Which technology is commonly used for secure remote access to a private network over a public network, such as the internet?
Answer:
VPN (Virtual Private Network)
A VPN (Virtual Private Network) establishes a secure, encrypted connection over a less secure network, such as the internet. This allows users to securely access private network resources as if they were directly connected to the private network.
24
Which acronym represents a technology that establishes a secure and encrypted connection over a less secure network, often used to protect online privacy and access restricted content?
Answer:
Virtual Private Network
VPN stands for Virtual Private Network. This technology creates a secure tunnel for data transmission over a public network, such as the internet. By encrypting the user's internet traffic and routing it through a server operated by the VPN provider, a VPN can effectively hide a user's IP address, protect data from eavesdropping, and bypass geographical restrictions on content. It's 'Virtual' because it's not a physical direct connection, and 'Private' because it secures and privatizes your connection over a public infrastructure.
25
Which of the following best describes the principle of 'Net Neutrality'?
Answer:
Internet service providers should enable access to all content and applications regardless of the source, without favoring or blocking particular products or websites.
Net neutrality is the principle that Internet service providers (ISPs) should treat all data on the Internet equally, not discriminating or charging differently by user, content, website, platform, application, type of attached equipment, or method of communication.
26
Which of the following actions are integral to the operation of a Permanent Virtual Circuit (PVC)?
Answer:
Both A and B.
A Permanent Virtual Circuit (PVC) is a pre-configured logical connection between two data communication devices. Unlike Switched Virtual Circuits (SVCs), which establish and tear down a connection for each session, a PVC remains perpetually established. Therefore, maintaining this continuous logical connection (Option A) is fundamental to its nature. Once established, its primary purpose is to facilitate the transfer of data packets (Option B) between the two endpoints without the overhead of connection setup or release for every transmission. Option C is incorrect because PVCs are 'permanent,' meaning they do not involve setup and teardown phases for individual data transmission sessions; those phases are handled at the time the PVC itself is provisioned by the network provider, not for each data transfer. Thus, both maintaining the connection and transferring data are key aspects of a PVC's operation.
27
What does a 'man-in-the-middle' attack typically aim to achieve in advanced internet security?
Answer:
To secretly intercept and alter communications between two parties.
A man-in-the-middle (MITM) attack involves an attacker secretly relaying and possibly altering the communication between two parties who believe they are communicating directly with each other. This allows the attacker to eavesdrop or manipulate the data exchange.
28
Which protocol is primarily used for real-time communication over the internet, such as voice and video calls?
Answer:
RTP (Real-time Transport Protocol)
RTP (Real-time Transport Protocol) is designed to handle the transmission of real-time data, like audio and video streams, over IP networks. It provides features such as sequence numbering and timestamping to assist with reordering and synchronization.