Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1191
A pop-up ad on your screen that is difficult to close might be a sign of:
Answer:
Adware or malware on your computer.
Aggressive and persistent pop-up ads are often a symptom of adware, a type of software that displays unwanted advertisements. In some cases, these pop-ups can also be part of a scam.
1192
An attacker may try to create a sense of trust by mentioning the name of a mutual acquaintance. This is known as:
Answer:
Name-dropping
Name-dropping is a simple but effective tactic to build instant credibility and lower a target's defenses by creating a false sense of a shared social connection.
1193
How can you protect yourself from vishing attacks?
Answer:
All of the above.
Being cautious about unsolicited calls, never providing sensitive information on a call you didn't initiate, and independently verifying the caller's identity are all crucial steps to protect against vishing.
1194
If you fall victim to a phishing attack and provide your password, what is the most important first step to take?
Answer:
Change the password for the compromised account and any other accounts using the same password.
The immediate priority is to regain control of your account by changing the password. It is also critical to change the password on any other service where you have reused the same password, as attackers will try it elsewhere.
1195
What is "pharming"?
Answer:
A type of phishing that directs users to a fraudulent website, even if they type in the correct web address.
Pharming is a more sophisticated cyberattack where a user is redirected to a malicious website without their knowledge, often by compromising DNS servers or a user's local host file.
1196
The presence of a "favicon" (the small icon in the browser tab) that matches a well-known brand:
Answer:
Can be easily copied and used on a fake website.
A favicon is just a small image file and can be easily copied by anyone. It should not be used as an indicator of a website's authenticity.
1197
Why is it important to regularly check your bank and credit card statements?
Answer:
To identify any unauthorized charges or fraudulent activity early.
Regularly reviewing your financial statements allows you to spot any suspicious transactions quickly. The sooner you report fraud, the easier it is to resolve the issue and limit your liability.
1198
If you receive a suspicious email, what is the best course of action?
Answer:
Delete the email and report it as phishing if possible.
The safest action is to delete the suspicious email without interacting with it. Most email clients also have an option to report the message as phishing, which helps the provider improve their filters.
1199
The most secure way to dispose of an old computer or hard drive is to:
Answer:
Physically destroy the hard drive.
Deleting files or formatting a drive does not permanently erase the data. With the right software, the data can often be recovered. The only way to be certain that the data is gone forever is to physically destroy the drive.
1200
An attacker impersonates a help desk technician over the phone to convince an employee to reveal their password. This is an example of:
Answer:
Vishing
This is a clear example of vishing (voice phishing), where the attacker uses a phone call and social engineering to manipulate the victim into divulging confidential information.