Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1211
What is "clone phishing"?
Answer:
A phishing attack where the attacker clones a legitimate email and replaces a link or attachment with a malicious one.
In a clone phishing attack, the attacker takes a legitimate, previously delivered email, duplicates it, and replaces a link or attachment with a malicious version, then sends the cloned email from a spoofed address.
1212
Pretending to be someone else to steal personal information is called what crime?
Answer:
Identity theft
Identity theft is the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
1213
Why is smishing becoming more common?
Answer:
All of the above.
Smishing is on the rise because people tend to be less suspicious of text messages, they are simple to create, and traditional security software on computers doesn't typically monitor SMS messages on a phone.
1214
How can you protect yourself from social engineering attacks?
Answer:
All of the above.
A healthy sense of skepticism, a habit of verifying identities through independent channels, and practicing good email and web hygiene are all essential defenses against social engineering.
1215
What is "incognito" or "private browsing" mode good for?
Answer:
Preventing your browsing history, cookies, and site data from being saved on your device.
Private browsing is useful for preventing other people who use the same computer from seeing your browsing history. However, it does not hide your activity from your internet service provider, your employer, or the websites you visit.
1216
What is a "SIM swap" scam?
Answer:
A scam where an attacker tricks your mobile provider into transferring your phone number to a new SIM card they control.
In a SIM swap attack, a scammer gains control of your phone number. This is particularly dangerous because they can then intercept two-factor authentication codes sent via SMS and gain access to your sensitive accounts.
1217
What is a "credential stuffing" attack?
Answer:
An automated attack where a large number of stolen username/password pairs are tried against a website.
Credential stuffing attacks take advantage of password reuse. Attackers obtain lists of credentials from a data breach at one site and then use bots to try those same credentials on other popular websites, like banking and social media sites.
1218
A fake website might have which of the following characteristics?
Answer:
All of the above.
Fake websites often exhibit signs of being hastily or unprofessionally made, such as poor grammar, low-resolution images, and a lack of detailed contact information. These are all red flags.
1219
What is the primary motivation behind most phishing attacks?
Answer:
Financial gain
While other motivations can exist, the vast majority of phishing attacks are financially motivated, aiming to steal money, credit card details, or other information that can be monetized.
1220
When you hover your mouse over a link in an email, where should you look to see the actual web address the link will take you to?
Answer:
In the bottom corner of your browser window or email client.
Most modern web browsers and email clients will display the true destination URL of a hyperlink in the status bar at the bottom of the window when you hover your cursor over it.