Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
61
What is a "credential stuffing" attack?
Answer:
An automated attack where a large number of stolen username/password pairs are tried against a website.
Credential stuffing attacks take advantage of password reuse. Attackers obtain lists of credentials from a data breach at one site and then use bots to try those same credentials on other popular websites, like banking and social media sites.
62
A fake website might have which of the following characteristics?
Answer:
All of the above.
Fake websites often exhibit signs of being hastily or unprofessionally made, such as poor grammar, low-resolution images, and a lack of detailed contact information. These are all red flags.
63
What is the primary motivation behind most phishing attacks?
Answer:
Financial gain
While other motivations can exist, the vast majority of phishing attacks are financially motivated, aiming to steal money, credit card details, or other information that can be monetized.
64
When you hover your mouse over a link in an email, where should you look to see the actual web address the link will take you to?
Answer:
In the bottom corner of your browser window or email client.
Most modern web browsers and email clients will display the true destination URL of a hyperlink in the status bar at the bottom of the window when you hover your cursor over it.
65
A social engineer might try to build rapport with a target by:
Answer:
All of the above.
Building a sense of trust and rapport is a key first step for a social engineer. They will often research their target to find ways to create a connection, making the target more likely to let their guard down.
66
Which medium is most often used by criminals to steal someone’s identity?
Answer:
Email
Email is a primary vector for phishing scams, where criminals trick users into revealing personal and financial information.
67
A website looks identical to your bank's website, but the URL is slightly different. What should you do?
Answer:
Close the website and manually type the correct URL for your bank in the address bar.
If the URL is different, it is very likely a phishing site. Do not interact with it. The safest action is to close the page and navigate to your bank's website by typing the known, correct address yourself.
68
What is it called when you are redirected from your intended website to a different unwanted site?
Answer:
Pharming
Pharming is a cyberattack intended to redirect a website's traffic to another, fake site, often to steal credentials.
69
Which of these is a physical, rather than digital, social engineering technique?
Answer:
Dumpster diving
Dumpster diving is a physical act of searching through trash. Phishing, vishing, and smishing are all carried out through digital or electronic communication channels.
70
Which of the following is a common characteristic of a phishing email?
Answer:
All of the above
Phishing emails often have tell-tale signs, including generic greetings, a sense of urgency to bypass rational thinking, and poor grammar or spelling, which are red flags of their fraudulent nature.