Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
51
Why is it important to check the domain name in a URL carefully?
Answer:
All of the above.
Carefully examining the domain name helps you spot misspellings (typosquatting), identify the actual domain owner, and avoid being tricked by websites that are designed to mimic legitimate sites.
52
What is a "phishing kit"?
Answer:
A collection of software and templates that makes it easy for scammers to create phishing websites and emails.
Phishing kits are pre-packaged sets of tools sold on the dark web that allow even novice criminals to easily launch sophisticated phishing campaigns, lowering the barrier to entry for this type of cybercrime.
53
What is "typosquatting"?
Answer:
A form of cyberattack that relies on common misspellings of popular websites.
Typosquatting, also known as URL hijacking, involves registering domain names that are common misspellings of legitimate sites (e.g., "gogle.com") to lure in unsuspecting users.
54
The "Quid Pro Quo" social engineering tactic involves:
Answer:
The attacker offering a service or benefit in exchange for information or access.
Quid pro quo, which means "something for something," involves the attacker offering a supposed benefit, such as "free IT help," in exchange for the victim's login credentials or other sensitive information.
55
What is "clone phishing"?
Answer:
A phishing attack where the attacker clones a legitimate email and replaces a link or attachment with a malicious one.
In a clone phishing attack, the attacker takes a legitimate, previously delivered email, duplicates it, and replaces a link or attachment with a malicious version, then sends the cloned email from a spoofed address.
56
Pretending to be someone else to steal personal information is called what crime?
Answer:
Identity theft
Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
57
Why is smishing becoming more common?
Answer:
All of the above.
Smishing is on the rise because people tend to be less suspicious of text messages, they are simple to create, and traditional security software on computers doesn't typically monitor SMS messages on a phone.
58
How can you protect yourself from social engineering attacks?
Answer:
All of the above.
A healthy sense of skepticism, a habit of verifying identities through independent channels, and practicing good email and web hygiene are all essential defenses against social engineering.
59
What is "incognito" or "private browsing" mode good for?
Answer:
Preventing your browsing history, cookies, and site data from being saved on your device.
Private browsing is useful for preventing other people who use the same computer from seeing your browsing history. However, it does not hide your activity from your internet service provider, your employer, or the websites you visit.
60
What is a "SIM swap" scam?
Answer:
A scam where an attacker tricks your mobile provider into transferring your phone number to a new SIM card they control.
In a SIM swap attack, a scammer gains control of your phone number. This is particularly dangerous because they can then intercept two-factor authentication codes sent via SMS and gain access to your sensitive accounts.