Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2711
An attacker compromises a legitimate software's update server to distribute malware to users. This is known as a:
Answer:
Supply chain attack.
A supply chain attack involves compromising a trusted vendor or process to distribute malware. By infecting a legitimate software update, attackers can gain access to all the users who trust and install that update.
2712
The term "threat intelligence" refers to:
Answer:
Organized, analyzed, and refined information about potential or current attacks that threaten an organization.
Threat intelligence is data that is collected and analyzed to understand a threat actor's motives, targets, and attack behaviors. Antivirus companies use this intelligence to proactively update their products and protect users.
2713
What type of software is often delivered to a PC through an email attachment and is designed to do harm?
Answer:
Malware
Malware, short for malicious software, is a general term for any software intentionally designed to cause disruption to a computer, server, client, or computer network. Viruses, worms, and Trojans are all types of malware, and email attachments are a common delivery method.
2714
What does the term "zero-day" vulnerability mean?
Answer:
A vulnerability that is unknown to the software vendor and for which no patch is available.
A "zero-day" vulnerability is a security flaw that has just been discovered by attackers, meaning the software developers have had "zero days" to create a patch. Attacks that exploit these vulnerabilities are highly effective because there is no defense against them yet.
2715
What do you call a self-replicating program that spreads without attaching to files?
Answer:
Worm
A computer worm is a standalone malware program that replicates itself to spread to other computers, often using a network.
2716
The SamSam ransomware was different from worms like WannaCry because it:
Answer:
Was manually targeted against specific organizations, rather than spreading indiscriminately.
Unlike automated, fast-spreading ransomware, SamSam attacks were highly targeted. The attackers would identify and breach a specific organization's network (often through RDP vulnerabilities) and then manually deploy the ransomware to cause maximum damage.
2717
How does ad-blocking software contribute to malware prevention?
Answer:
By blocking malicious advertisements (malvertising) that can infect a computer even without a click.
Ad-blockers can be an effective security tool because they prevent ads from loading in your browser. This can protect you from malvertising, a common method for distributing malware through compromised ad networks.
2718
What is the "payload" of a malware?
Answer:
The part of the malware that performs the malicious action.
In the context of malware, the payload is the component that executes the intended malicious activity, such as deleting files, encrypting data, or opening a backdoor. The rest of the malware code is often dedicated to spreading and concealment.
2719
The Ryuk malware is a type of:
Answer:
Targeted ransomware often used in "big game hunting" against large corporations.
Ryuk is a prominent example of ransomware used in targeted attacks against large enterprises. It is often deployed as the final payload after an initial infection by other malware like Emotet or TrickBot, and the attackers demand very high ransom payments.
2720
The best way to ensure the legitimacy of a software download is to:
Answer:
Verify the download's digital signature or checksum hash, if provided by the developer.
A digital signature or a checksum (like SHA-256) is a way to verify the integrity and authenticity of a file. By comparing the hash of the file you downloaded with the hash provided on the official developer's website, you can ensure the file hasn't been tampered with.