Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
41
Why is it important to regularly check your bank and credit card statements?
Answer:
To identify any unauthorized charges or fraudulent activity early.
Regularly reviewing your financial statements allows you to spot any suspicious transactions quickly. The sooner you report fraud, the easier it is to resolve the issue and limit your liability.
42
If you receive a suspicious email, what is the best course of action?
Answer:
Delete the email and report it as phishing if possible.
The safest action is to delete the suspicious email without interacting with it. Most email clients also have an option to report the message as phishing, which helps the provider improve their filters.
43
The most secure way to dispose of an old computer or hard drive is to:
Answer:
Physically destroy the hard drive.
Deleting files or formatting a drive does not permanently erase the data. With the right software, the data can often be recovered. The only way to be certain that the data is gone forever is to physically destroy the drive.
44
An attacker impersonates a help desk technician over the phone to convince an employee to reveal their password. This is an example of:
Answer:
Vishing
This is a clear example of vishing (voice phishing), where the attacker uses a phone call and social engineering to manipulate the victim into divulging confidential information.
45
Why is it a good idea to cover your laptop's webcam when you are not using it?
Answer:
To prevent "camfecting," where attackers remotely activate your webcam without your knowledge.
Camfecting is a real threat where malware can give an attacker control of your webcam. Covering the lens is a simple and effective physical measure to protect your privacy.
46
Which of the following is a sign that a website might not be trustworthy?
Answer:
The website pressures you to make a quick decision or purchase.
High-pressure sales tactics or urgent "act now" messages can be a sign of a scam. Legitimate businesses typically do not pressure customers into making immediate decisions.
47
What is the safest way to download new software?
Answer:
From the official developer's or publisher's website.
To avoid downloading counterfeit software that may be bundled with malware, you should always download software directly from the official source, such as the developer's website or a trusted app store.
48
An email claiming to be from a popular online service asks you to update your password by clicking a link. The link, however, goes to a different website. This is a form of:
Answer:
Phishing
This is a classic phishing tactic. The email creates a pretext (password update) to get the user to click a malicious link leading to a fake website designed to steal their credentials.
49
What is the main difference between phishing and spear phishing?
Answer:
Phishing targets a broad audience, while spear phishing targets specific individuals.
The key distinction is the level of targeting. Phishing is a wide-net approach, sending generic fraudulent messages to many people, whereas spear phishing is a highly targeted and personalized attack on a specific person or group.
50
To defend against tailgating, a company should implement:
Answer:
All of the above.
A multi-layered approach is best for preventing tailgating. This includes physical security measures like secure doors, clear policies for visitors, and an aware workforce that is empowered to question strangers.