Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
81
You are on a website and a pop-up appears, claiming your computer is infected with viruses and you need to call a phone number for tech support. This is a sign of:
Answer:
A tech support scam.
This is a common tech support scam that uses fake virus alerts to frighten users into calling a fraudulent support number, where they will be pressured into paying for unnecessary and often harmful services.
82
What is phishing in cybersecurity?
Answer:
Fraudulent data theft
Phishing tricks users into revealing sensitive data via fake messages or sites.
83
If your web browser warns you that a website is "not secure" or that the "connection is not private," you should:
Answer:
Close the tab and avoid entering any personal information on the site.
These warnings from your browser are important security indicators. They often mean the website has an invalid or expired security certificate, and you should not trust it with any sensitive information.
84
Why do scammers often ask for payment in the form of gift cards, wire transfers, or cryptocurrency?
Answer:
They are like cash; once the money is sent, it is very difficult or impossible to trace and recover.
Scammers prefer irreversible and anonymous payment methods because it makes it much harder for law enforcement to track them and for victims to get their money back.
85
If you are unsure about a link, what is a safe way to investigate it?
Answer:
All of the above.
All of these are safe methods for investigating a suspicious link without exposing your own computer to potential threats. Using a sandbox or a link scanner are particularly effective technical solutions.
86
A "tech support scam" typically involves:
Answer:
A pop-up message or phone call claiming your computer has a virus.
Tech support scams use fear tactics, like fake virus warnings, to trick people into believing there is a problem with their computer. The scammers then charge for unnecessary or fraudulent "repairs."
87
A social engineer might use jargon and technical terms to:
Answer:
Both A and B.
Using technical language can make a social engineer sound like a legitimate expert (e.g., an IT support person) and can also overwhelm a target, making them more likely to comply with requests without understanding them.
88
An attacker sends an email claiming to be from a courier company, stating that a package could not be delivered. The email includes an attachment that is supposedly a shipping label but is actually malware. This is an example of using what as a lure?
Answer:
Curiosity
This type of attack preys on the victim's curiosity about the "undelivered package," enticing them to open the malicious attachment without thinking.
89
What is the best way to respond to a suspected social engineering attempt?
Answer:
Politely refuse the request and report the incident through proper channels.
The safest and most professional response is to deny the request and then report it to your IT or security department. Trying to engage with the attacker can be risky and is not recommended.
90
A phishing email that appears to come from a government agency, such as the tax office, is a common tactic because:
Answer:
These emails can evoke fear and a sense of authority, making people more likely to comply.
Impersonating a government body is an effective phishing tactic because it plays on people's respect for authority and their fear of legal or financial repercussions, making them more likely to follow the instructions in the fraudulent email.