Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1161
"Clickjacking" is an attack where:
Answer:
An attacker tricks a user into clicking on something different from what the user perceives.
In a clickjacking attack, a user thinks they are clicking on a legitimate button (e.g., "Play Video"), but they are actually clicking on a hidden, invisible link that might, for example, "like" a page on social media or initiate a download.
1162
Is a website with a ".org" domain more trustworthy than one with a ".com" domain?
Answer:
No, the trustworthiness of a website does not depend on its top-level domain.
While ".org" was originally intended for non-profit organizations, the registration rules are now much less strict. Anyone can register a ".org" domain, so it should not be considered an inherent sign of trustworthiness.
1163
You see an ad on a website for a product at an unbelievably low price. The ad leads to a shopping site you've never heard of. What should you be wary of?
Answer:
All of the above.
"Too good to be true" offers are a major red flag. The website could be a front for a scam, sell counterfeit goods, or have inadequate security, putting your financial information at risk.
1164
A text message from an unknown number claims you've won a prize and you need to click a link to claim it. This is a common tactic in:
Answer:
Smishing
Using enticing offers like prizes to lure victims into clicking malicious links is a very common technique used in smishing (SMS phishing) attacks.
1165
A person receives a call and the caller ID shows the name of their bank. This means:
Answer:
Caller ID can be easily faked (spoofed), so it cannot be trusted as a sole means of verification.
Caller ID spoofing is a common technique used by social engineers in vishing attacks. It is trivial to make a call appear to come from any number or name, so caller ID should never be fully trusted.
1166
If you think you have been a victim of online fraud, what should you do?
Answer:
All of the above.
It is important to take several steps after falling victim to fraud: report the crime, protect your finances by contacting your bank, and secure your online accounts to prevent further damage.
1167
Is it possible for a phishing attack to be carried out in person?
Answer:
Yes, but it is very rare and is more accurately described as social engineering.
While phishing is predominantly an online activity, the principles of deception and impersonation can be applied in person. However, this is more broadly categorized under the umbrella of social engineering.
1168
What is "spyware"?
Answer:
A type of malicious software that secretly gathers information about a person or organization and sends it to another entity.
Spyware is a form of malware that is designed to be hidden and to monitor your activity, log your keystrokes, and collect sensitive information like passwords and credit card numbers.
1169
What is a "typosquatting" or "URL hijacking" website?
Answer:
A website that intentionally uses a common misspelling of a popular website's name to trick users.
Typosquatting relies on users making common typing errors when entering a URL. Scammers register these misspelled domains and set up fake websites to steal information or spread malware.
1170
Why is it important to have antivirus software installed and kept up to date?
Answer:
It can detect and remove most known types of malware.
Antivirus software is a fundamental security tool that scans your computer for malware and helps to protect you from infection. It is crucial to keep it updated so it can recognize the latest threats.