Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2671
What is the best practice for handling an unsolicited email with a suspicious attachment?
Answer:
Forward the email to your IT department and then delete it permanently without opening the attachment.
Never open unsolicited or suspicious attachments. The safest course of action is to not interact with it and report it to your security or IT team. If the email is from a known contact but seems strange, verify with them through a separate communication channel (e.g., a phone call).
2672
What is a type of program that spreads from program to program or from disk to disk?
Answer:
Virus.
A computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. It operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
2673
What is "real-time protection" or "on-access scanning"?
Answer:
A feature that automatically scans files as they are opened, downloaded, or executed to prevent infections before they happen.
Real-time protection is a critical feature of modern antivirus software. It runs continuously in the background, actively monitoring the system for any signs of malware and checking files in real-time to stop threats immediately.
2674
What is the primary function of an antivirus program?
Answer:
Scan a device, identify, and eliminate viruses
The comprehensive function of an antivirus program is a multi-step process. It first actively scans a computer's files and programs for known malware signatures and suspicious behavior. When a potential threat is found, it identifies the specific type of malware and then takes action to quarantine or eliminate it.
2675
A common way for a computer virus to spread is through:
Answer:
Malicious email attachments.
Email is one of the most common vectors for malware infection. Attackers send emails with infected attachments (e.g., fake invoices, shipping notices) and use social engineering to trick the recipient into opening them.
2676
Why are software vulnerabilities a major infection method for malware?
Answer:
They provide a way for attackers to bypass security measures and execute malicious code.
Vulnerabilities are flaws or weaknesses in software code. Attackers create "exploits" that take advantage of these flaws to force the software to behave in unintended ways, often allowing the attacker to install malware on the system.
2677
A "user awareness training" program is a key malware prevention technique because:
Answer:
It educates employees on how to recognize and respond to threats like phishing and social engineering.
Since users are often the first line of defense and the primary target of many attacks, training them to be vigilant and security-conscious is one of the most effective ways an organization can reduce its risk of a malware infection.
2678
Why can connecting to an unsecured public Wi-Fi network be an infection risk?
Answer:
Attackers on the same network can intercept your traffic and inject malware.
On an unsecured network, an attacker can perform a "man-in-the-middle" attack, positioning themselves between you and the internet. This allows them to intercept data and potentially redirect your browser to a malicious site or inject malware into legitimate downloads.
2679
Why is it important to have regular backups of your important data?
Answer:
Backups allow you to restore your files in the event of a ransomware attack or other data-destroying malware.
Backups are your ultimate safety net. If your files are encrypted by ransomware or corrupted by a virus, having a recent, clean backup means you can restore your data without having to pay a ransom or losing it forever.
2680
The Flame malware, discovered in 2012, was remarkable for its size and complexity. It was primarily designed for what purpose?
Answer:
Cyber espionage.
Flame was an incredibly complex modular malware platform designed for espionage. It could record audio, capture screenshots, log keystrokes, and scan for nearby Bluetooth devices, acting as a comprehensive suite of spying tools.