Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2751
The Melissa virus (1999) was a fast-spreading macro virus that propagated via:
Answer:
An email attachment that, when opened, would mail itself to the first 50 people in the user's address book.
The Melissa virus was one of the first major email-borne threats to gain widespread attention. It used a simple but effective social engineering trick to get users to open a Word document, which then triggered a macro to email the virus to the user's contacts.
2752
What is a key lesson learned from studying famous malware attacks?
Answer:
That keeping software patched and educating users about phishing are critical defenses.
A common thread through many of the most damaging malware outbreaks is the exploitation of unpatched vulnerabilities (WannaCry, Code Red) and the success of social engineering (ILOVEYOU, Melissa). This highlights the timeless importance of basic cyber hygiene, such as patching and user awareness.
2753
What is the primary purpose of ransomware?
Answer:
To encrypt a user's files and demand a payment for the decryption key.
Ransomware is a form of malware that encrypts the victim's files, making them inaccessible. The attacker then demands a ransom, usually in cryptocurrency, in exchange for the key needed to decrypt the files.
2754
Why is it a bad idea to enable remote desktop access (RDP) on a computer and expose it directly to the internet?
Answer:
RDP is a common target for attackers who scan the internet for open RDP ports to launch brute-force or exploit attacks.
Exposing RDP directly to the internet is extremely risky and a common vector for ransomware attacks. If remote access is needed, it should be secured behind a VPN and protected with strong passwords and multi-factor authentication.
2755
Adware is a type of malware that:
Answer:
Automatically displays or downloads unwanted advertising material.
Adware, short for advertising-supported software, is a type of malware that bombards a user with pop-up ads. While sometimes just an annoyance, it can also track browsing habits and, in some cases, act as a gateway for more malicious software.
2756
The Zeus (or Zbot) malware, first identified in 2007, is a Trojan horse that primarily targets victims to:
Answer:
Steal online banking information.
Zeus is one of the most famous and successful banking Trojans ever created. It is used to infect computers and steal financial information through methods like keylogging and form grabbing, and it has been used to steal hundreds of millions of dollars.
2757
What kind of software detects and removes viruses?
Answer:
Antivirus
Antivirus software scans systems for harmful code and eliminates it to maintain security.
2758
Files on your computer have been renamed with a strange extension, and you can no longer open them. A text file has appeared on your desktop demanding payment. This is a clear sign of:
Answer:
Ransomware.
The two key symptoms described—the encryption of files (making them inaccessible) and the appearance of a ransom note demanding payment—are the defining characteristics of a ransomware attack.
2759
A "web application firewall" (WAF) is a specific type of firewall that:
Answer:
Sits in front of a web server to protect it from common web-based attacks.
A WAF is a specialized security tool designed to protect web applications by filtering and monitoring HTTP traffic between the application and the internet. It can help prevent attacks that target vulnerabilities in the website's code.
2760
A "blended threat" is a type of malware attack that:
Answer:
Combines the characteristics of multiple types of malware, such as a worm, Trojan, and virus, into one attack.
A blended threat uses multiple attack vectors and malware types to maximize its severity and rate of infection. For example, it might use a worm to spread and a Trojan payload to create a backdoor on infected systems.