Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1181
What is "ransomware"?
Answer:
A type of malware that encrypts your files and demands a ransom payment to restore access.
Ransomware is a particularly nasty form of malware that can lock you out of your own data. The attackers demand payment, often in cryptocurrency, in exchange for a decryption key.
1182
Why is it a good practice to log out of websites when you are finished using them, especially on a public computer?
Answer:
To prevent someone else from accessing your account.
If you simply close the browser tab without logging out, your session may remain active. The next person to use the computer could potentially access your account just by visiting the same website.
1183
Why is it a bad idea to enter personal information on a website that does not use HTTPS?
Answer:
Your information can be easily intercepted by third parties.
Without HTTPS, the data you send to the website (like passwords or credit card numbers) is transmitted in plain text, which means it can be easily read by anyone who intercepts the traffic between your computer and the server.
1184
The most reliable way to get to a website is to:
Answer:
Type the website address directly into your browser's address bar.
Typing the address yourself or using a trusted bookmark that you created are the most secure ways to ensure you are visiting the legitimate website and not a fake one from a phishing link.
1185
What is "information gathering" in the context of a social engineering attack?
Answer:
The first phase of an attack, where the attacker researches the target.
Before launching an attack, a social engineer will spend time gathering information about their target (individual or organization) from public sources like company websites, social media, and news articles to make their approach more convincing.
1186
What is identity theft?
Answer:
When someone uses your personal information without your permission to commit fraud.
Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized purchases or applying for loans.
1187
Why is it risky to post too much personal information on social media?
Answer:
All of the above.
Every piece of information you share online can potentially be used against you by a social engineer to build a profile, create a personalized attack, or compromise your accounts.
1188
If you are selling an item online and the buyer sends you a check for more than the asking price and asks you to wire them the difference, what should you do?
Answer:
Assume it is a scam, as the check is likely fake and will bounce after you have sent the money.
This is a very common overpayment scam. The scammer's check is fraudulent, and by the time your bank discovers this, you will have already sent them real money from your account, and you will be held responsible for the bounced check.
1189
What is two-factor authentication (2FA)?
Answer:
A security process that requires two different methods of verification to log in.
2FA adds a second layer of security to your accounts. In addition to your password, it requires a second piece of information, such as a code from your phone, to verify your identity.
1190
A "job scam" often involves:
Answer:
All of the above.
Legitimate employers will not ask you to pay for a job. Unrealistic salary promises, requests for upfront fees, and unprofessional hiring processes are all major red flags for a job scam.