Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2701
What type of malware is designed to replicate itself and spread to other computers, often without any human action?
Answer:
Worm
A worm is a standalone piece of malicious software that replicates itself to spread to other computers. Unlike a virus, it does not need to attach itself to an existing program and can spread independently through a network.
2702
The NotPetya malware attack in 2017 initially appeared to be ransomware, but its primary purpose was later determined to be:
Answer:
Data destruction.
While NotPetya did encrypt files and demand a ransom, security researchers concluded it was actually a "wiper" disguised as ransomware. The payment mechanism was non-functional, and the malware was designed to permanently damage the infected systems, primarily targeting Ukraine.
2703
What is cryptojacking?
Answer:
The unauthorized use of someone else's computer to mine cryptocurrency.
Cryptojacking is a type of malware or browser-based attack where a script secretly uses a victim's computer processing power to mine cryptocurrencies like Bitcoin or Monero, which can slow down the computer significantly.
2704
What is the goal of a "security audit"?
Answer:
A thorough, systematic evaluation of an organization's security policies, controls, and infrastructure.
A security audit is a proactive measure to identify weaknesses and vulnerabilities before they are exploited. It's a comprehensive review that helps an organization understand its security posture and where improvements are needed.
2705
What is one of the most effective techniques for preventing malware infections?
Answer:
Keeping your operating system and all of your software up to date with the latest security patches.
Many malware attacks exploit known vulnerabilities in software. Developers release security patches to fix these vulnerabilities. By regularly updating your software, you close these security holes, making it much harder for attackers to get in.
2706
The Mirai botnet, which caused massive internet outages in 2016, was primarily composed of what type of devices?
Answer:
Insecure Internet of Things (IoT) devices like routers and webcams.
The Mirai botnet was created by scanning the internet for IoT devices that were still using their factory-default usernames and passwords. It infected hundreds of thousands of these devices and used them to launch massive Distributed Denial of Service (DDoS) attacks.
2707
CryptoLocker, which emerged in 2013, was a pioneering and particularly nasty form of what?
Answer:
Ransomware
CryptoLocker was one of the first widespread and highly successful ransomware Trojans. It used strong encryption on a victim's files and gave them a deadline to pay the ransom, after which the private key would be destroyed, making recovery impossible.
2708
A company can use "egress filtering" on its firewall to help prevent data theft. What does this mean?
Answer:
It monitors and restricts outbound traffic to prevent malware from sending sensitive data to an attacker.
While firewalls are commonly used to block malicious incoming traffic (ingress filtering), egress filtering is also crucial. By controlling what data can *leave* the network, a company can block a malware infection from successfully exfiltrating stolen data.
2709
The DarkHotel attacks are a form of spear phishing that targets:
Answer:
Traveling business executives through hotel Wi-Fi networks.
The DarkHotel group targets high-profile individuals, like corporate executives, while they are traveling. The attackers compromise a hotel's Wi-Fi and use it to trick the target into downloading malware, often disguised as a software update for a popular application.
2710
Which of the following is NOT a type of malware?
Answer:
Firewall
A firewall is a network security device, either hardware or software-based, that monitors and filters incoming and outgoing network traffic. It is a defensive tool used to prevent malware, not a type of malware itself.