Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2731
You receive an unexpected email from a friend with a generic subject line like "Check this out!" and a link. This could be an infection attempt because:
Answer:
Your friend's email account may have been compromised and is being used to spread malware.
Even if an email is from a known contact, you should be suspicious of unexpected messages with generic text and links. It's a common tactic for malware to spread by hijacking email accounts and sending malicious links to the victim's contacts.
2732
In addition to antivirus software, what other tool provides a crucial layer of defense by monitoring network traffic?
Answer:
A firewall
A firewall acts as a barrier between your computer and the internet. It can block malware from entering your network in the first place and can also prevent malware already on your computer from communicating with its master servers.
2733
The "Shamoon" malware, used in attacks against Saudi Arabian energy companies, is what type of malware?
Answer:
A wiper
Shamoon is a destructive wiper malware. Its payload overwrites the master boot record (MBR) of infected computers, making them unbootable, and then wipes files on the hard drive, causing maximum disruption.
2734
The "Storm Worm," which appeared in 2007, built a massive botnet. It spread via emails with what kind of subject lines?
Answer:
Subject lines related to recent news headlines and disasters.
The Storm Worm was a piece of social engineering malware that constantly changed its lure based on current events. It used eye-catching subject lines like "230 dead as storm batters Europe" to trick users into clicking on malicious links or opening infected attachments.
2735
The Stuxnet, Flame, and Duqu malware are all believed to be part of what nation-state's cyber warfare program?
Answer:
The United States and Israel
While no country has officially claimed responsibility, extensive forensic analysis by security researchers has led to a broad consensus that these highly sophisticated pieces of malware were likely developed as part of a joint cyber-espionage and warfare program by the United States and Israel.
2736
What is an "anti-malware" tool?
Answer:
It is a broader term that includes protection against viruses, spyware, adware, and other malicious software.
While the terms are often used interchangeably, "anti-malware" is a more modern and comprehensive term. "Antivirus" historically referred specifically to tools for fighting computer viruses, whereas "anti-malware" covers the full spectrum of malicious software.
2737
What is a small program embedded inside a GIF image called?
Answer:
Web bug
A web bug, or tracking pixel, is a tiny, often invisible, graphic embedded in a webpage or email to track user activity.
2738
Why might a full system scan with an antivirus take a long time?
Answer:
Because it is thoroughly checking every file, folder, and running process on your computer's hard drive.
A full system scan is a deep and comprehensive check of your entire system. On a computer with a large hard drive and many files, it is normal for this process to take several hours as the antivirus software meticulously examines every single file.
2739
What does it mean when an antivirus program "quarantines" a file?
Answer:
It moves the infected file to a secure, isolated location on your computer to prevent it from causing further harm.
Quarantine is a safe-holding area for infected files. This isolates the file from the rest of the system, so it can't run or infect other files, and gives the user a chance to review the file before deciding to delete it permanently.
2740
What is a "logic bomb"?
Answer:
A piece of malware that is set to go off when a specific condition is met, such as a certain date or the deletion of an employee's name from a payroll list.
A logic bomb is a malicious piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. They are often planted by insiders with a grudge.