Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1171
Phishing that occurs through pop-up ads on websites is known as:
Answer:
All of the above
Malvertising, pop-up phishing, and ad phishing all refer to the use of malicious advertisements, often in the form of pop-ups, to trick users into visiting phishing websites or downloading malware.
1172
What is a major risk of using out-of-date software (e.g., an old web browser or operating system)?
Answer:
It may have unpatched security vulnerabilities that hackers can exploit.
Software updates frequently include patches for newly discovered security flaws. Running old software is like leaving a door unlocked for hackers, as it may contain known vulnerabilities that can be easily exploited to install malware or steal data.
1173
What is a key sign of a "charity scam"?
Answer:
The charity pressures you to donate immediately.
Legitimate charities will welcome your donation whenever you choose to make it. Scammers often create a sense of urgency to prevent you from researching the charity and discovering it is fake.
1174
What is a "romance scam"?
Answer:
A scam where someone pretends to be in love with the victim to gain their trust and then asks for money.
In a romance scam, fraudsters create fake profiles on dating sites or social media and build an emotional connection with their targets over time, eventually fabricating a story and asking for money.
1175
What is "reverse social engineering"?
Answer:
When an attacker creates a situation where the victim initiates contact with them for "help."
In reverse social engineering, the attacker first sabotages something (e.g., corrupts a user's file) and then positions themselves as the person who can fix the problem, causing the victim to come to them and willingly offer up information.
1176
What is "baiting" in the context of social engineering?
Answer:
All of the above.
Baiting uses the promise of an item or good to entice victims. This can be a physical object like a USB drive or a digital item like a free movie download, all with the goal of tricking the user into compromising their security.
1177
The best defense against phishing is:
Answer:
User awareness and skepticism
While technical defenses like antivirus and firewalls are important, the most effective defense against phishing is a vigilant and educated user who can recognize the signs of a phishing attempt and knows not to click on suspicious links or open strange attachments.
1178
A website's domain name is "paypal.com.secure-login.net". What is the actual domain you are connecting to?
Answer:
secure-login.net
The main domain is the part of the URL immediately before the top-level domain (e.g., .com, .net, .org). In this case, "secure-login.net" is the actual domain, and "paypal.com" is just a subdomain designed to trick you.
1179
What is a "firewall"?
Answer:
A network security system that monitors and controls incoming and outgoing network traffic.
A firewall acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. It helps to block unauthorized access to your computer or network.
1180
Which of the following is a psychological principle often used in social engineering?
Answer:
All of the above
Social engineers use many psychological triggers, including pretending to be a person in authority (like a manager or police officer), intimidating the victim, or creating a false sense of scarcity (e.g., "this offer is only available for the next 10 minutes").