Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
71
What does the term "angler phishing" refer to?
Answer:
Phishing attacks that occur on social media platforms.
Angler phishing is a type of phishing attack where scammers use fake social media accounts of legitimate companies to interact with customers and steal their personal information.
72
A link points to "[www.google.com](https://www.google.com)", but with a Cyrillic 'o' (o) instead of a Latin 'o' (o). This is an example of:
Answer:
A homograph attack.
A homograph attack uses characters from different alphabets that look identical or very similar to Latin characters to create deceptive domain names. This can be very difficult to spot.
73
An email from your "CEO" asks you to urgently purchase gift cards for clients and send them the codes. This is a common sign of:
Answer:
A Business Email Compromise (BEC) scam.
This is a classic example of a Business Email Compromise or CEO fraud scam. The attacker impersonates an executive and uses a sense of urgency to trick an employee into making an unauthorized financial transaction, often involving hard-to-trace methods like gift cards.
74
_________are attempts by individuals to obtain confidential information from you by falsifying their identity?
Answer:
Phishing scams
Phishing is a type of social engineering attack where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information. The attacker masquerades as a trustworthy entity, such as a bank or a well-known company, to deceive the victim.
75
The ultimate defense against social engineering is:
Answer:
A well-trained and aware workforce.
While technology plays a role, the human element is the primary target of social engineering. Therefore, continuous training, awareness, and fostering a culture of security are the most effective defenses.
76
Which of the following is NOT a type of phishing?
Answer:
Rootkit
A rootkit is a type of malicious software that is designed to gain unauthorized access to a computer system and remain hidden. Phishing, smishing, and vishing are all forms of social engineering attacks designed to steal information.
77
What is a "man-in-the-middle" (MitM) attack?
Answer:
An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
A MitM attack is a form of eavesdropping where an attacker intercepts a connection between two systems. This is a major risk on unsecured public Wi-Fi networks.
78
A spear phishing attack that targets high-level executives is also known as:
Answer:
All of the above
Whaling, CEO fraud, and executive phishing are all terms used to describe spear phishing attacks that specifically target senior executives and other high-value individuals within an organization.
79
Why is it a bad idea to use public Wi-Fi for sensitive transactions like online banking?
Answer:
Your data can be easily intercepted by others on the same network.
Public Wi-Fi networks are often unencrypted and not secure. This makes it easy for attackers on the same network to "eavesdrop" on your connection and steal any information you send, including usernames, passwords, and credit card numbers.
80
Social engineering attacks can be used to:
Answer:
All of the above.
Social engineering is a versatile attack vector that can be used to achieve a wide range of malicious goals, from data theft to facilitating other types of cyberattacks.