Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2651
Which of the following can be a way for a computer virus to enter a system?
Answer:
Borrowed software copies
Using unauthorized or pirated software is a common way for computer viruses to be introduced to a system.
2652
What is the most frequent virus entry point on a hard disk?
Answer:
Incoming Email
Email attachments are common carriers of viruses that can infect computers.
2653
A "vulnerability scanner" is a tool that:
Answer:
Scans a computer or network for known security weaknesses that malware could exploit.
A vulnerability scanner proactively looks for security holes, such as out-of-date software or misconfigurations, that could serve as an entry point for malware. It helps you patch weaknesses before they are exploited.
2654
Which virus infects 32-bit Windows 95/98/NT executable files?
Answer:
Chernobyl virus
The Chernobyl virus (also known as CIH or Spacefiller) was a notorious computer virus that specifically targeted executable files on Windows 9x-based operating systems. It was highly destructive, capable of erasing the hard drive and overwriting the system's BIOS.
2655
Your friends tell you they are receiving strange emails from your email account that you did not send. This could be a sign that:
Answer:
Your email account has been compromised or your computer is infected with malware.
A common behavior of some malware is to hijack a user's email account or email client to send copies of itself to everyone in the user's contact list, thus propagating the infection.
2656
To prevent malware, it's a good practice to review the permissions an app requests before installing it. You should be suspicious if:
Answer:
A simple calculator app asks for permission to access your contacts, microphone, and location.
You should always apply the principle of least privilege to app permissions. An app should only have access to the resources it absolutely needs to function. A calculator app has no legitimate reason to access your contacts or microphone, which is a major red flag.
2657
You have downloaded an anti-malware tool called "VirusScanner.exe" from a pop-up ad. When you run it, it claims to find hundreds of viruses and asks for payment to remove them. This tool is likely:
Answer:
A "rogue" security software, which is a form of malware itself.
This is a classic rogue security software or scareware scam. The software itself is the malware; it provides fake scan results and uses fear to trick the user into paying for a useless product, often while installing other malware in the background.
2658
A Trojan that creates a botnet is often called a:
Answer:
Zombie
A computer that has been infected with malware and has become part of a botnet is often referred to as a "zombie" or "bot." It sits dormant until it receives commands from the "botmaster" who controls the network.
2659
Which computer virus records every movement you make on your computer?
Answer:
Keylogger
A keylogger is a type of spyware that records every keystroke a user makes, often to steal login credentials and sensitive data.
2660
What is a "botnet"?
Answer:
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
A botnet is a collection of internet-connected devices, which may include PCs, servers, and mobile devices, that are infected and remotely controlled by a common type of malware. They are often used to launch large-scale attacks like DDoS attacks.