Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
81
What type of software is often delivered to a PC through an email attachment and is designed to do harm?
Answer:
Malware
Malware, short for malicious software, is a general term for any software intentionally designed to cause disruption to a computer, server, client, or computer network. Viruses, worms, and Trojans are all types of malware, and email attachments are a common delivery method.
82
What does the term "zero-day" vulnerability mean?
Answer:
A vulnerability that is unknown to the software vendor and for which no patch is available.
A "zero-day" vulnerability is a security flaw that has just been discovered by attackers, meaning the software developers have had "zero days" to create a patch. Attacks that exploit these vulnerabilities are highly effective because there is no defense against them yet.
83
What do you call a self-replicating program that spreads without attaching to files?
Answer:
Worm
A computer worm is a standalone malware program that replicates itself to spread to other computers, often using a network.
84
The SamSam ransomware was different from worms like WannaCry because it:
Answer:
Was manually targeted against specific organizations, rather than spreading indiscriminately.
Unlike automated, fast-spreading ransomware, SamSam attacks were highly targeted. The attackers would identify and breach a specific organization's network (often through RDP vulnerabilities) and then manually deploy the ransomware to cause maximum damage.
85
How does ad-blocking software contribute to malware prevention?
Answer:
By blocking malicious advertisements (malvertising) that can infect a computer even without a click.
Ad-blockers can be an effective security tool because they prevent ads from loading in your browser. This can protect you from malvertising, a common method for distributing malware through compromised ad networks.
86
What is the "payload" of a malware?
Answer:
The part of the malware that performs the malicious action.
In the context of malware, the payload is the component that executes the intended malicious activity, such as deleting files, encrypting data, or opening a backdoor. The rest of the malware code is often dedicated to spreading and concealment.
87
The Ryuk malware is a type of:
Answer:
Targeted ransomware often used in "big game hunting" against large corporations.
Ryuk is a prominent example of ransomware used in targeted attacks against large enterprises. It is often deployed as the final payload after an initial infection by other malware like Emotet or TrickBot, and the attackers demand very high ransom payments.
88
The best way to ensure the legitimacy of a software download is to:
Answer:
Verify the download's digital signature or checksum hash, if provided by the developer.
A digital signature or a checksum (like SHA-256) is a way to verify the integrity and authenticity of a file. By comparing the hash of the file you downloaded with the hash provided on the official developer's website, you can ensure the file hasn't been tampered with.
89
A loss of hard drive space that you cannot account for can be a symptom of malware because:
Answer:
Some malware creates many hidden files or copies of itself, taking up disk space.
Some types of malware may download additional malicious modules, create hidden log files, or replicate themselves, all of which can consume a noticeable amount of disk space over time.
90
What invisible technique tracks user behavior on websites?
Answer:
Web Beacon
Web beacons are hidden code snippets embedded in pages or emails for tracking.