Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1221
A social engineer might try to build rapport with a target by:
Answer:
All of the above.
Building a sense of trust and rapport is a key first step for a social engineer. They will often research their target to find ways to create a connection, making the target more likely to let their guard down.
1222
Which medium is most often used by criminals to steal someone’s identity?
Answer:
Email
Email is a primary vector for phishing scams, where criminals trick users into revealing personal and financial information.
1223
A website looks identical to your bank's website, but the URL is slightly different. What should you do?
Answer:
Close the website and manually type the correct URL for your bank in the address bar.
If the URL is different, it is very likely a phishing site. Do not interact with it. The safest action is to close the page and navigate to your bank's website by typing the known, correct address yourself.
1224
What is it called when you are redirected from your intended website to a different unwanted site?
Answer:
Pharming
Pharming is a cyberattack intended to redirect a website's traffic to another, fake site, often to steal credentials.
1225
Which of these is a physical, rather than digital, social engineering technique?
Answer:
Dumpster diving
Dumpster diving is a physical act of searching through trash. Phishing, vishing, and smishing are all carried out through digital or electronic communication channels.
1226
Which of the following is a common characteristic of a phishing email?
Answer:
All of the above
Phishing emails often have tell-tale signs, including generic greetings, a sense of urgency to bypass rational thinking, and poor grammar or spelling, which are red flags of their fraudulent nature.
1227
What does the term "angler phishing" refer to?
Answer:
Phishing attacks that occur on social media platforms.
Angler phishing is a type of phishing attack where scammers use fake social media accounts of legitimate companies to interact with customers and steal their personal information.
1228
A link points to "[www.google.com](https://www.google.com)", but with a Cyrillic 'o' (o) instead of a Latin 'o' (o). This is an example of:
Answer:
A homograph attack.
A homograph attack uses characters from different alphabets that look identical or very similar to Latin characters to create deceptive domain names. This can be very difficult to spot.
1229
An email from your "CEO" asks you to urgently purchase gift cards for clients and send them the codes. This is a common sign of:
Answer:
A Business Email Compromise (BEC) scam.
This is a classic example of a Business Email Compromise or CEO fraud scam. The attacker impersonates an executive and uses a sense of urgency to trick an employee into making an unauthorized financial transaction, often involving hard-to-trace methods like gift cards.
1230
_________are attempts by individuals to obtain confidential information from you by falsifying their identity?
Answer:
Phishing scams
Phishing is a type of social engineering attack where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information. The attacker masquerades as a trustworthy entity, such as a bank or a well-known company, to deceive the victim.