Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
31
Why is it risky to post too much personal information on social media?
Answer:
All of the above.
Every piece of information you share online can potentially be used against you by a social engineer to build a profile, create a personalized attack, or compromise your accounts.
32
If you are selling an item online and the buyer sends you a check for more than the asking price and asks you to wire them the difference, what should you do?
Answer:
Assume it is a scam, as the check is likely fake and will bounce after you have sent the money.
This is a very common overpayment scam. The scammer's check is fraudulent, and by the time your bank discovers this, you will have already sent them real money from your account, and you will be held responsible for the bounced check.
33
What is two-factor authentication (2FA)?
Answer:
A security process that requires two different methods of verification to log in.
2FA adds a second layer of security to your accounts. In addition to your password, it requires a second piece of information, such as a code from your phone, to verify your identity.
34
A "job scam" often involves:
Answer:
All of the above.
Legitimate employers will not ask you to pay for a job. Unrealistic salary promises, requests for upfront fees, and unprofessional hiring processes are all major red flags for a job scam.
35
A pop-up ad on your screen that is difficult to close might be a sign of:
Answer:
Adware or malware on your computer.
Aggressive and persistent pop-up ads are often a symptom of adware, a type of software that displays unwanted advertisements. In some cases, these pop-ups can also be part of a scam.
36
An attacker may try to create a sense of trust by mentioning the name of a mutual acquaintance. This is known as:
Answer:
Name-dropping
Name-dropping is a simple but effective tactic to build instant credibility and lower a target's defenses by creating a false sense of a shared social connection.
37
How can you protect yourself from vishing attacks?
Answer:
All of the above.
Being cautious about unsolicited calls, never providing sensitive information on a call you didn't initiate, and independently verifying the caller's identity are all crucial steps to protect against vishing.
38
If you fall victim to a phishing attack and provide your password, what is the most important first step to take?
Answer:
Change the password for the compromised account and any other accounts using the same password.
The immediate priority is to regain control of your account by changing the password. It is also critical to change the password on any other service where you have reused the same password, as attackers will try it elsewhere.
39
What is "pharming"?
Answer:
A type of phishing that directs users to a fraudulent website, even if they type in the correct web address.
Pharming is a more sophisticated cyberattack where a user is redirected to a malicious website without their knowledge, often by compromising DNS servers or a user's local host file.
40
The presence of a "favicon" (the small icon in the browser tab) that matches a well-known brand:
Answer:
Can be easily copied and used on a fake website.
A favicon is just a small image file and can be easily copied by anyone. It should not be used as an indicator of a website's authenticity.