Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
51
What is a "digital certificate"?
Answer:
An electronic document used to prove the ownership of a public key.
A digital certificate, issued by a Certificate Authority, is like a digital passport. It contains information like the owner's name, the public key, the certificate's expiration date, and the digital signature of the CA, which vouches for the certificate's authenticity.
52
An attacker sends a fraudulent email that appears to be from a senior executive in a company, instructing an employee in the finance department to make an urgent wire transfer. This is an example of:
Answer:
Business Email Compromise (BEC) or CEO fraud
This is a highly targeted form of spear phishing known as BEC or CEO fraud. The attacker uses social engineering, impersonation, and a sense of urgency to trick an employee into bypassing normal security procedures and making an unauthorized financial transaction.
53
Which security measure, implemented as either hardware or software, is designed to prevent unauthorized access to a computer network?
Answer:
Firewall
A firewall acts as a critical barrier between a trusted internal network and an untrusted external network, such as the internet. It works by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Firewalls can be implemented as dedicated hardware appliances or as software running on a server or individual computer, making them a versatile tool for preventing unauthorized access and mitigating various cyber threats.
54
A "packet-filtering" firewall operates at which layer of the OSI model?
Answer:
Layer 3 (Network) and Layer 4 (Transport)
A basic packet-filtering firewall makes its decisions based on information in the network and transport layer headers, such as source and destination IP addresses, ports, and the protocol type (TCP, UDP, ICMP).
55
What is the primary function of an Intrusion Detection System (IDS)?
Answer:
To monitor network or system activities for malicious activity or policy violations and to produce reports or alerts.
An IDS is a passive monitoring tool, like a security camera. It watches network traffic and system logs, and if it detects something suspicious that matches a known attack signature or an anomaly, it generates an alert for a security administrator to investigate.
56
Which authentication factor relies on an item that is exclusively owned and controlled by the legitimate user?
Answer:
Possession (Something you have)
This question describes the 'Possession' authentication factor. This factor validates a user's identity based on a physical item they possess, such as a smartphone (for software tokens or push notifications), a hardware security key (like a YubiKey), a smart card, or a one-time password (OTP) token. These items are typically unique to the user and are required to complete the authentication process.
Let's look at why the other options are incorrect:
* **Knowledge (Something you know)** refers to information only the user should know, like a password, PIN, or security question answer.
* **Inherence (Something you are)** refers to biometric factors, such as fingerprints, facial recognition, or iris scans.
* **Location (Somewhere you are)** is an additional context-aware authentication factor that verifies the user's geographical position, often used in conjunction with other factors, but it's not one of the primary 'Something you know/have/are' categories.
57
What does "salting" a password mean in cryptography?
Answer:
Adding a unique, random string of characters to a password before it is hashed.
Salting is a crucial security measure for password storage. By adding a unique salt to each password before hashing, it ensures that two users with the same password will have different hashes. This prevents attackers from using pre-computed "rainbow tables" to crack the hashes.
58
Which authentication factor is most susceptible to a shoulder surfing attack?
Answer:
Knowledge (PIN or password)
Shoulder surfing is the act of looking over someone's shoulder to see what they are typing. This makes knowledge-based factors like passwords and PINs, which must be visibly entered, the most vulnerable to this type of attack.
59
A race condition is a vulnerability that occurs when:
Answer:
The outcome of a process depends on the specific timing or sequence of uncontrollable events.
In cybersecurity, a race condition vulnerability can be exploited by an attacker who influences the timing of events to bypass a security control. For example, an attacker might try to use a gift card twice by sending two simultaneous requests before the system can update the balance.
60
What is a "hash function"?
Answer:
A function that takes an input of any size and produces a fixed-size string of characters, which is a one-way representation of the input.
A hash function creates a unique, fixed-length "digital fingerprint" of a piece of data. It's a one-way process; you cannot reverse the hash to get the original data. Hashing is used to verify data integrity and to store passwords securely.