Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2741
You are on a website, and it says you must install a special "video codec" to watch a movie. This is likely:
Answer:
A trick to get you to download and install malware.
Modern web browsers have built-in support for all common video formats. A website that prompts you to download an external codec or player is almost certainly trying to deceive you into installing malware.
2742
What does a "behavioral blocker" in a security suite do?
Answer:
It monitors for and blocks suspicious actions in programs, such as modifying the boot record or encrypting large numbers of files.
A behavioral blocker is a proactive security component that focuses on what a program *does* rather than what it *is*. It watches for malware-like behaviors and can stop an attack even if it's from a brand-new threat that has no signature.
2743
What type of virus uses computer hosts to reproduce itself?
Answer:
Worm
A worm is a standalone piece of malicious software that reproduces itself and spreads from computer to computer, usually over a network. Unlike a virus, it doesn't need to attach itself to a host program to propagate.
2744
What distinguishes spyware from other types of malware like viruses or worms?
Answer:
Its primary goal is information gathering, not replication or damage.
While viruses and worms are focused on spreading and causing disruption, the main objective of spyware is to remain hidden and collect data about the user's activities, which is then sent back to the attacker.
2745
Which of the following is NOT a feature of a modern antivirus or internet security suite?
Answer:
Hard drive defragmentation
Hard drive defragmentation is a system maintenance utility that organizes files on a hard drive to improve performance. While useful, it is not a security feature and is not typically part of an antivirus suite.
2746
What is a "polymorphic" virus?
Answer:
A virus that changes its own code (mutates) to avoid detection by antivirus software.
Polymorphic malware constantly changes its identifiable features, such as its file name or encryption keys, to evade detection. This mutation makes it very difficult for signature-based antivirus scanners to identify.
2747
A "keylogger" is a specific type of:
Answer:
Spyware
A keylogger is a form of spyware that records every keystroke a user makes on their keyboard. This is a common method for stealing passwords, credit card numbers, and other confidential information.
2748
A "host-based" firewall protects:
Answer:
A single computer.
A host-based firewall is a software firewall installed on an individual computer (the "host"). It controls traffic for that specific machine, as opposed to a network firewall, which protects an entire network.
2749
The "Operation Aurora" cyberattack, which was disclosed by Google in 2010, was a series of attacks that targeted high-tech US companies. This type of attack is known as an:
Answer:
Advanced Persistent Threat (APT).
Operation Aurora was a classic example of an APT, which is a prolonged and targeted cyberattack where an attacker gains access to a network and remains undetected for an extended period. The goal of an APT is typically espionage or data theft, not immediate disruption.
2750
What kind of malware appears legitimate but performs malicious activity once run?
Answer:
Trojan horse
A Trojan horse disguises itself as a legitimate program but carries a malicious payload that executes when the program is run.