Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2681
A "potentially unwanted program" (PUP) is:
Answer:
Software that a user may not want, often installed alongside another program the user did want.
PUPs, also known as potentially unwanted applications (PUAs), are programs that are often included in the installer for a legitimate application. They can include adware, toolbars, or other software that the user did not explicitly intend to install.
2682
What is a primary reason to avoid using public Wi-Fi for sensitive activities like online banking?
Answer:
All of the above.
to avoid using public Wi-Fi for sensitive activities like online banking?
2683
What is a "watering hole" attack?
Answer:
An attack where an attacker observes which websites a group of users often visits and infects one of those sites with malware.
In a watering hole attack, instead of going after the targets directly, the attacker infects a third-party website that the targets are known to frequent. The goal is to infect the targets when they visit the compromised, but seemingly legitimate, website.
2684
What does "hardening" an operating system mean?
Answer:
The process of securing a system by reducing its surface of vulnerability.
Hardening involves disabling unnecessary services, removing unneeded software, applying secure configurations, and patching vulnerabilities. The goal is to reduce the number of potential entry points for an attacker.
2685
What is a primary defense against a brute-force attack, which tries to guess your password?
Answer:
Implementing account lockout policies after a certain number of failed login attempts.
An account lockout policy will temporarily or permanently lock an account after a specified number of incorrect password attempts, which effectively stops an automated brute-force attack from being able to try thousands of passwords per second.
2686
Why is using an administrator account for everyday computer use considered a security risk?
Answer:
If malware infects an administrator account, it has full privileges to do anything on the system, including disabling security software and infecting core system files.
Running as a standard user limits the potential damage malware can do. A standard user account has restricted permissions and cannot make system-wide changes, which can contain an infection and prevent it from taking full control of the computer.
2687
Which mechanism is used by the computer virus ‘worm’ to duplicate itself?
Answer:
Spawn
A computer worm is a type of malware that replicates itself to spread to other computers. In computer science, the process of a parent process creating a new child process is often referred to as 'spawning'. This term aptly describes how a worm creates new, independent copies of itself to infect other systems.
2688
You notice that your computer's cooling fan is constantly running at high speed, even when you are not doing anything intensive. This could be a symptom of:
Answer:
Malware, such as a cryptojacker, using up your CPU resources.
Malware like cryptojackers or spyware can run hidden processes that use a lot of your computer's processing power (CPU). This high utilization generates heat, causing the cooling fan to spin continuously to compensate.
2689
The Conficker worm (2008) was notoriously difficult to remove because it:
Answer:
Used advanced techniques to disable security software and block access to antivirus websites.
Conficker was a sophisticated threat for its time. It employed multiple mechanisms for defense, including disabling security services, blocking Windows updates, and preventing users from navigating to the websites of major antivirus vendors.
2690
A user inserts an unknown USB drive they found in the parking lot into their work computer. This action could lead to an infection via:
Answer:
Social engineering and baiting.
This is a classic example of "baiting," a social engineering tactic. Attackers intentionally leave infected USB drives in public places, relying on human curiosity to get someone to plug the drive into a computer, which then automatically installs malware.