Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
31
Which of the following is an example of 'biometric authentication'?
Answer:
Using a fingerprint scan or facial recognition
Biometric authentication verifies a person's identity based on unique physiological (e.g., fingerprints, facial features) or behavioral (e.g., voice, gait) characteristics. It's 'something you are'.
32
Which of the following describes a 'Trojan horse'?
Answer:
Malicious software disguised as legitimate software
A Trojan horse (or Trojan) is a type of malware that disguises itself as legitimate software to trick users into installing it. Once installed, it can perform various malicious activities.
33
What is 'privacy by design'?
Answer:
Integrating privacy considerations and protections into the design and operation of information systems, products, and practices from the outset
Privacy by Design is an approach that ensures privacy is embedded into the design and architecture of IT systems and business practices, rather than being an afterthought. It's a proactive approach to privacy protection.
34
What is the specific type of malware designed to spy on user activity, often without their knowledge?
Answer:
Spyware
Spyware is malicious software designed to gather information about a person or organization without their knowledge and send it to another entity. This can include browsing habits, email content, and sensitive data.
35
Which of the following would NOT typically be part of a robust incident response plan?
Answer:
Disabling all security systems to observe attacker behavior
Disabling all security systems is a highly risky and illogical action that would exacerbate an incident, not resolve it. A robust incident response plan focuses on systematic steps to prepare for, detect, contain, eradicate, recover from, and post-analyze security incidents.
36
Which of the following is considered 'personally identifiable information' (PII)?
Answer:
Name, address, and social security number
Personally Identifiable Information (PII) is any data that can be used to identify a specific individual. A combination of name, address, and social security number (or similar unique identifiers) definitively falls under PII. Public IP or MAC addresses usually need more context to identify an individual directly.
37
Which type of attack involves an attacker observing electrical signals, acoustics, or timing of cryptographic operations to extract secret keys?
Answer:
Side-channel attack
Side-channel attacks exploit information gained from the physical implementation of a cryptosystem, rather than theoretical weaknesses in the cryptography itself. This includes timing information, power consumption, electromagnetic leaks, or even sound.
38
Which principle states that security measures should be diversified to prevent a single point of failure?
Answer:
Defense in depth
Defense in depth is a security strategy that employs multiple layers of security controls (e.g., firewalls, IDS, antivirus, strong passwords) to protect information. If one layer fails, another layer is available to provide protection.
39
What is the primary concern addressed by data encryption?
Answer:
Confidentiality
Encryption is the process of converting information into a code to prevent unauthorized access. Its primary purpose is to ensure confidentiality, meaning only authorized parties can understand the information.
40
What is the purpose of a Intrusion Prevention System (IPS)?
Answer:
To actively block or stop potential security threats detected on a network
An IPS is a network security device that monitors network and/or system activities for malicious activity. The primary function of an IPS is to identify suspicious activity and take automated action to prevent it, such as blocking traffic or dropping malicious packets.