Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
41
Which security measure is specifically designed to protect against SQL Injection attacks?
Answer:
Using parameterized queries or prepared statements
SQL Injection attacks exploit vulnerabilities in web applications that allow attackers to insert malicious SQL code into input fields. Parameterized queries and prepared statements prevent this by separating user input from SQL commands.
42
What does a 'rootkit' do?
Answer:
It provides a privileged, stealthy foothold in an operating system, often designed to hide the existence of other malware
A rootkit is a collection of malicious software designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other malware.
43
What is the primary role of an Intrusion Detection System (IDS)?
Answer:
To identify potential security breaches, policy violations, or suspicious activities on a network or system
An IDS monitors network or system activities for malicious activity or policy violations and generates alerts. Unlike an Intrusion Prevention System (IPS), an IDS primarily detects rather than actively blocks threats.
44
What is the purpose of a Security Information and Event Management (SIEM) system?
Answer:
To collect and analyze security logs and events from various sources to provide real-time analysis of security alerts
A SIEM system is a centralized platform that aggregates and correlates security-related data from various sources (firewalls, servers, applications) to detect and respond to security incidents. It helps in gaining insight into an organization's security posture.
45
What is the primary benefit of regularly backing up your data?
Answer:
To recover data in case of loss, corruption, or system failure, thereby ensuring availability and integrity
Regular data backups are fundamental for business continuity and disaster recovery. They allow for the restoration of data after unforeseen events like hardware failure, accidental deletion, ransomware attacks, or other forms of data loss, directly supporting availability and integrity.
46
What is the primary function of a Security Awareness Training program?
Answer:
To educate employees about cybersecurity threats and best practices to reduce human risk
Security awareness training aims to educate employees about common cybersecurity threats (like phishing), their role in protecting company assets, and best practices to follow to minimize human-related security risks.
47
What is 'social engineering' in cybersecurity?
Answer:
The manipulation of people into performing actions or divulging confidential information
Social engineering is a psychological manipulation of people into performing actions or divulging confidential information. It exploits human psychology rather than technical vulnerabilities, often leading to phishing, pretexting, or baiting attacks.
48
What is the primary risk of using outdated software?
Answer:
Exposure to known, unpatched security vulnerabilities that attackers can exploit
Outdated software often contains known security vulnerabilities that have been discovered and publicly disclosed. If these vulnerabilities are not patched through updates, attackers can easily exploit them to gain unauthorized access or cause damage.
49
What is multi-factor authentication (MFA)?
Answer:
Requiring two or more verification factors to gain access to a resource
Multi-factor authentication (MFA) enhances security by requiring users to provide two or more different types of verification methods (e.g., something you know like a password, something you have like a phone, something you are like a fingerprint).
50
What is the 'principle of least privilege'?
Answer:
Granting users only the minimum necessary access rights to perform their job functions
The principle of least privilege is a security best practice that dictates users, programs, or processes should be granted only the minimum level of access or permissions needed to perform their tasks. This reduces the attack surface and potential damage from a compromise.