Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2641
If you suspect your computer is infected, what is one of the first steps you should take?
Answer:
Disconnect the computer from the internet and any local networks.
Disconnecting from the network is a crucial first step. This prevents the malware from spreading to other devices on your network and stops it from communicating with the attacker's servers, which could involve sending your data or receiving further instructions.
2642
What is "heuristic analysis" in the context of antivirus software?
Answer:
A method of detecting new, previously unknown malware by examining its behavior and code structure for suspicious characteristics.
Heuristic analysis is a more advanced detection method that doesn't rely on known signatures. Instead, it looks for suspicious traits or behaviors in a program (e.g., trying to modify system files, replicating itself) to identify malware that has never been seen before.
2643
What is the most widely spread computer worm?
Answer:
ILOVEYOU worm
The "ILOVEYOU" worm, which spread globally in 2000, is considered one of the most widespread and damaging computer viruses in history. It propagated via email as an attachment, causing billions of dollars in damages by overwriting files and sending itself to the victim's contacts.
2644
What is a limitation of signature-based antivirus detection?
Answer:
It is ineffective against new, "zero-day" malware for which a signature has not yet been created.
The main weakness of signature-based detection is that it is purely reactive. It can only identify threats that are already known and have a signature in its database. It offers no protection against brand-new malware.
2645
What is the primary infection vector for macro viruses?
Answer:
Malicious Microsoft Office documents (e.g., Word, Excel).
Macro viruses are written in a macro language and are embedded within documents. They spread when a user opens an infected document and enables macros, which allows the malicious code to run.
2646
Which type of viruses are triggered by time or date?
Answer:
Time bombs
A time bomb is a piece of malware that is designed to execute its malicious payload at a specific date or time.
2647
Why is it risky to download software from untrusted websites or peer-to-peer (P2P) file-sharing networks?
Answer:
The software is often bundled with hidden malware, such as Trojans or spyware.
Unofficial software download sources are a breeding ground for malware. Attackers often package Trojans or other malicious code with pirated or "free" versions of popular software.
2648
What is "pharming"?
Answer:
A type of phishing attack that redirects a user to a fraudulent website, even if they type the correct URL.
Pharming is a sophisticated infection method where an attacker compromises DNS settings on a user's computer or a network's DNS server. This allows them to redirect traffic from a legitimate website to a fake, malicious one without the user's knowledge.
2649
The Code Red worm (2001) exploited a vulnerability in what software?
Answer:
Microsoft's Internet Information Services (IIS) web server
Code Red spread by exploiting a buffer overflow vulnerability in Microsoft's IIS web server software. Once infected, a server would deface its own website and then begin scanning for other vulnerable servers to infect.
2650
Malware that attaches itself to an executable file and requires a host program to spread is called a:
Answer:
Virus
A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. It operates by inserting or attaching itself to a legitimate program or document that supports macros.