Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
71
What is cryptojacking?
Answer:
The unauthorized use of someone else's computer to mine cryptocurrency.
Cryptojacking is a type of malware or browser-based attack where a script secretly uses a victim's computer processing power to mine cryptocurrencies like Bitcoin or Monero, which can slow down the computer significantly.
72
What is the goal of a "security audit"?
Answer:
A thorough, systematic evaluation of an organization's security policies, controls, and infrastructure.
A security audit is a proactive measure to identify weaknesses and vulnerabilities before they are exploited. It's a comprehensive review that helps an organization understand its security posture and where improvements are needed.
73
What is one of the most effective techniques for preventing malware infections?
Answer:
Keeping your operating system and all of your software up to date with the latest security patches.
Many malware attacks exploit known vulnerabilities in software. Developers release security patches to fix these vulnerabilities. By regularly updating your software, you close these security holes, making it much harder for attackers to get in.
74
The Mirai botnet, which caused massive internet outages in 2016, was primarily composed of what type of devices?
Answer:
Insecure Internet of Things (IoT) devices like routers and webcams.
The Mirai botnet was created by scanning the internet for IoT devices that were still using their factory-default usernames and passwords. It infected hundreds of thousands of these devices and used them to launch massive Distributed Denial of Service (DDoS) attacks.
75
CryptoLocker, which emerged in 2013, was a pioneering and particularly nasty form of what?
Answer:
Ransomware
CryptoLocker was one of the first widespread and highly successful ransomware Trojans. It used strong encryption on a victim's files and gave them a deadline to pay the ransom, after which the private key would be destroyed, making recovery impossible.
76
A company can use "egress filtering" on its firewall to help prevent data theft. What does this mean?
Answer:
It monitors and restricts outbound traffic to prevent malware from sending sensitive data to an attacker.
While firewalls are commonly used to block malicious incoming traffic (ingress filtering), egress filtering is also crucial. By controlling what data can *leave* the network, a company can block a malware infection from successfully exfiltrating stolen data.
77
The DarkHotel attacks are a form of spear phishing that targets:
Answer:
Traveling business executives through hotel Wi-Fi networks.
The DarkHotel group targets high-profile individuals, like corporate executives, while they are traveling. The attackers compromise a hotel's Wi-Fi and use it to trick the target into downloading malware, often disguised as a software update for a popular application.
78
Which of the following is NOT a type of malware?
Answer:
Firewall
A firewall is a network security device, either hardware or software-based, that monitors and filters incoming and outgoing network traffic. It is a defensive tool used to prevent malware, not a type of malware itself.
79
An attacker compromises a legitimate software's update server to distribute malware to users. This is known as a:
Answer:
Supply chain attack.
A supply chain attack involves compromising a trusted vendor or process to distribute malware. By infecting a legitimate software update, attackers can gain access to all the users who trust and install that update.
80
The term "threat intelligence" refers to:
Answer:
Organized, analyzed, and refined information about potential or current attacks that threaten an organization.
Threat intelligence is data that is collected and analyzed to understand a threat actor's motives, targets, and attack behaviors. Antivirus companies use this intelligence to proactively update their products and protect users.