Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
31
How can a worm like WannaCry spread so quickly through a corporate network?
Answer:
By exploiting an unpatched vulnerability in the Windows operating system.
The WannaCry ransomware worm spread rapidly by exploiting a known vulnerability in the Server Message Block (SMB) protocol in Microsoft Windows. It could autonomously scan for and infect other vulnerable computers on the same network without any user interaction.
32
What made the Stuxnet worm, discovered in 2010, particularly famous and significant?
Answer:
It was designed to cause physical damage to industrial equipment (specifically, Iranian nuclear centrifuges).
Stuxnet is considered the first true cyber-weapon. It was a highly sophisticated worm that targeted specific industrial control systems (ICS) and manipulated them to cause physical destruction, demonstrating that malware could bridge the gap between the digital and physical worlds.
33
What is a "drive-by download"?
Answer:
An infection method where malware is automatically downloaded to a computer just by visiting a compromised website.
A drive-by download is a stealthy attack where a user doesn't need to click anything or approve a download to become infected. Simply loading a malicious webpage can be enough to trigger the malware download and execution.
34
What was the target of the Triton (also known as Trisis) malware, discovered in 2017?
Answer:
Safety Instrumented Systems (SIS) in industrial plants.
Triton is an extremely dangerous piece of malware because it specifically targets Safety Instrumented Systems, which are the last line of automated defense against a catastrophic failure in an industrial facility. By compromising the SIS, the malware could cause immense physical damage and loss of life.
35
What is a "heuristic sensitivity level" setting in an antivirus program?
Answer:
It allows you to adjust how aggressive the heuristic analysis is when looking for suspicious behavior.
A higher sensitivity level will make the antivirus more likely to catch new malware, but it also increases the risk of false positives (flagging legitimate files as malicious). A lower level does the opposite.
36
Which deceptive program appears legitimate but harms executable files?
Answer:
Trojan Horse
Trojans mislead users by imitating safe applications while containing malicious code.
37
What country's infrastructure was the primary target of the BlackEnergy malware attacks in 2015?
Answer:
Ukraine
The BlackEnergy malware was used in a sophisticated cyberattack against Ukraine's power grid, which resulted in a large-scale power outage. It was one of the first confirmed instances of a cyberattack taking down a nation's power grid.
38
Which term refers to software designed to disrupt normal computer operations?
Answer:
Malware
Malware is malicious software that harms systems by corrupting files or disrupting services.
39
What is the best practice for handling an unsolicited email with a suspicious attachment?
Answer:
Forward the email to your IT department and then delete it permanently without opening the attachment.
Never open unsolicited or suspicious attachments. The safest course of action is to not interact with it and report it to your security or IT team. If the email is from a known contact but seems strange, verify with them through a separate communication channel (e.g., a phone call).
40
What is a type of program that spreads from program to program or from disk to disk?
Answer:
Virus.
A computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. It operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.