Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
41
What is "real-time protection" or "on-access scanning"?
Answer:
A feature that automatically scans files as they are opened, downloaded, or executed to prevent infections before they happen.
Real-time protection is a critical feature of modern antivirus software. It runs continuously in the background, actively monitoring the system for any signs of malware and checking files in real-time to stop threats immediately.
42
What is the primary function of an antivirus program?
Answer:
Scan a device, identify, and eliminate viruses
The comprehensive function of an antivirus program is a multi-step process. It first actively scans a computer's files and programs for known malware signatures and suspicious behavior. When a potential threat is found, it identifies the specific type of malware and then takes action to quarantine or eliminate it.
43
A common way for a computer virus to spread is through:
Answer:
Malicious email attachments.
Email is one of the most common vectors for malware infection. Attackers send emails with infected attachments (e.g., fake invoices, shipping notices) and use social engineering to trick the recipient into opening them.
44
Why are software vulnerabilities a major infection method for malware?
Answer:
They provide a way for attackers to bypass security measures and execute malicious code.
Vulnerabilities are flaws or weaknesses in software code. Attackers create "exploits" that take advantage of these flaws to force the software to behave in unintended ways, often allowing the attacker to install malware on the system.
45
A "user awareness training" program is a key malware prevention technique because:
Answer:
It educates employees on how to recognize and respond to threats like phishing and social engineering.
Since users are often the first line of defense and the primary target of many attacks, training them to be vigilant and security-conscious is one of the most effective ways an organization can reduce its risk of a malware infection.
46
Why can connecting to an unsecured public Wi-Fi network be an infection risk?
Answer:
Attackers on the same network can intercept your traffic and inject malware.
On an unsecured network, an attacker can perform a "man-in-the-middle" attack, positioning themselves between you and the internet. This allows them to intercept data and potentially redirect your browser to a malicious site or inject malware into legitimate downloads.
47
Why is it important to have regular backups of your important data?
Answer:
Backups allow you to restore your files in the event of a ransomware attack or other data-destroying malware.
Backups are your ultimate safety net. If your files are encrypted by ransomware or corrupted by a virus, having a recent, clean backup means you can restore your data without having to pay a ransom or losing it forever.
48
The Flame malware, discovered in 2012, was remarkable for its size and complexity. It was primarily designed for what purpose?
Answer:
Cyber espionage.
Flame was an incredibly complex modular malware platform designed for espionage. It could record audio, capture screenshots, log keystrokes, and scan for nearby Bluetooth devices, acting as a comprehensive suite of spying tools.
49
A "potentially unwanted program" (PUP) is:
Answer:
Software that a user may not want, often installed alongside another program the user did want.
PUPs, also known as potentially unwanted applications (PUAs), are programs that are often included in the installer for a legitimate application. They can include adware, toolbars, or other software that the user did not explicitly intend to install.
50
What is a primary reason to avoid using public Wi-Fi for sensitive activities like online banking?
Answer:
All of the above.
to avoid using public Wi-Fi for sensitive activities like online banking?