Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2781
The SQL Slammer worm (2003) caused a massive internet slowdown in a very short amount of time by:
Answer:
Exploiting a vulnerability in Microsoft SQL Server and generating a huge amount of network traffic.
SQL Slammer was a tiny worm that spread with astonishing speed. It exploited a known bug in SQL Server and, once infected, a machine would begin firing off a huge number of requests to infect other vulnerable servers, overwhelming networks with traffic.
2782
What is the most secure way to dispose of a sensitive document?
Answer:
Using a cross-cut or micro-cut shredder.
Dumpster diving is a real threat. To prevent attackers from recovering sensitive information from discarded paper, documents should be thoroughly destroyed using a cross-cut shredder, which makes reassembly extremely difficult.
2783
The "3-2-1 backup rule" is a recommended strategy that means:
Answer:
Have at least 3 copies of your data, on 2 different types of media, with 1 copy kept off-site.
The 3-2-1 rule is a robust and resilient backup strategy. It ensures that you have redundant copies of your data (3 copies) on different storage types (2 media, e.g., hard drive and cloud) and protects against localized disasters like fire or theft (1 off-site copy).
2784
What type of malware changes its form each time it is installed to evade antivirus detection?
Answer:
Polymorphic virus
A polymorphic virus is a complex type of malware that can change its underlying code and signature patterns with each new infection. This constant mutation makes it very difficult for signature-based antivirus software to detect and remove.
2785
The ultimate effectiveness of any antivirus tool depends on:
Answer:
The user's safe browsing habits and security awareness.
Antivirus software is a critical tool, but it is not a substitute for user vigilance. Safe practices, such as not opening suspicious attachments, avoiding shady websites, and thinking before you click, are just as important for preventing malware infections.
2786
What type of malware is specifically designed to secretly observe a user's activities and collect their sensitive information?
Answer:
Spyware
Spyware is a category of malware designed to gather information about a person or organization without their knowledge. It can record keystrokes (keylogging), capture screenshots, and harvest login credentials or credit card numbers.
2787
What is the primary function of antivirus software?
Answer:
To detect, prevent, and remove malicious software.
Antivirus (AV) software is a security utility designed to protect a computer system from malware. Its core function is to scan for, identify, and then either quarantine or delete malicious code.
2788
What is a "rootkit"?
Answer:
A collection of software tools that enables an unauthorized user to gain control of a computer system without being detected.
A rootkit is a particularly dangerous type of malware designed to be hidden from the user and the operating system. It allows an attacker to maintain privileged, "root-level" access to a computer while actively hiding its presence.
2789
Using a firewall is a malware prevention technique because it can:
Answer:
Block unauthorized access to and from your computer over the network.
A firewall acts as a gatekeeper for your network connection. It can prevent malware from getting into your system from the internet and can also block an existing infection from sending your data out to an attacker.
2790
An "air-gapped" computer is one that:
Answer:
Is physically isolated and not connected to any network, including the internet.
An air gap is an extreme security measure where a computer or network is physically disconnected from all other networks to prevent remote attacks. This technique is used for highly sensitive systems, such as those controlling critical infrastructure.