Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1201
Why is it a good idea to cover your laptop's webcam when you are not using it?
Answer:
To prevent "camfecting," where attackers remotely activate your webcam without your knowledge.
Camfecting is a real threat where malware can give an attacker control of your webcam. Covering the lens is a simple and effective physical measure to protect your privacy.
1202
Which of the following is a sign that a website might not be trustworthy?
Answer:
The website pressures you to make a quick decision or purchase.
High-pressure sales tactics or urgent "act now" messages can be a sign of a scam. Legitimate businesses typically do not pressure customers into making immediate decisions.
1203
What is the safest way to download new software?
Answer:
From the official developer's or publisher's website.
To avoid downloading counterfeit software that may be bundled with malware, you should always download software directly from the official source, such as the developer's website or a trusted app store.
1204
An email claiming to be from a popular online service asks you to update your password by clicking a link. The link, however, goes to a different website. This is a form of:
Answer:
Phishing
This is a classic phishing tactic. The email creates a pretext (password update) to get the user to click a malicious link leading to a fake website designed to steal their credentials.
1205
What is the main difference between phishing and spear phishing?
Answer:
Phishing targets a broad audience, while spear phishing targets specific individuals.
The key distinction is the level of targeting. Phishing is a wide-net approach, sending generic fraudulent messages to many people, whereas spear phishing is a highly targeted and personalized attack on a specific person or group.
1206
To defend against tailgating, a company should implement:
Answer:
All of the above.
A multi-layered approach is best for preventing tailgating. This includes physical security measures like secure doors, clear policies for visitors, and an aware workforce that is empowered to question strangers.
1207
Why is it important to check the domain name in a URL carefully?
Answer:
All of the above.
Carefully examining the domain name helps you spot misspellings (typosquatting), identify the actual domain owner, and avoid being tricked by websites that are designed to mimic legitimate sites.
1208
What is a "phishing kit"?
Answer:
A collection of software and templates that makes it easy for scammers to create phishing websites and emails.
Phishing kits are pre-packaged sets of tools sold on the dark web that allow even novice criminals to easily launch sophisticated phishing campaigns, lowering the barrier to entry for this type of cybercrime.
1209
What is "typosquatting"?
Answer:
A form of cyberattack that relies on common misspellings of popular websites.
Typosquatting, also known as URL hijacking, involves registering domain names that are common misspellings of legitimate sites (e.g., "gogle.com") to lure in unsuspecting users.
1210
The "Quid Pro Quo" social engineering tactic involves:
Answer:
The attacker offering a service or benefit in exchange for information or access.
Quid pro quo, which means "something for something," involves the attacker offering a supposed benefit, such as "free IT help," in exchange for the victim's login credentials or other sensitive information.