Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2791
A "false positive" in an antivirus scan occurs when:
Answer:
The antivirus incorrectly identifies a legitimate, harmless file as malware.
A false positive is a false alarm. It happens when the antivirus software, often through heuristic analysis, mistakenly flags a safe file as malicious. This can sometimes cause problems if a critical system file is quarantined.
2792
Ultimately, the best malware prevention strategy is:
Answer:
A layered defense-in-depth approach that combines technical controls (antivirus, firewall) with user education and good practices.
There is no single "magic bullet" for security. An effective strategy uses multiple layers of defense. If one layer fails, another may still stop the attack. This combination of technology, processes, and people provides the most robust protection.
2793
Why is it a good security practice to review your online account's privacy settings regularly?
Answer:
All of the above.
Regularly reviewing and tightening your privacy settings helps to control your digital footprint. Limiting the amount of information you share publicly makes you a less attractive and more difficult target for social engineers and other attackers.
2794
What is the "allow list" or "whitelist" feature in a security tool?
Answer:
A list of programs or files that you have designated as safe and should be ignored by the scanner.
The allow list is used to tell your antivirus or security software not to scan or block specific items that you know are safe. This is useful for preventing false positives on legitimate software that may exhibit unusual behavior.
2795
Which malicious programs replicate themselves while consuming storage space?
Answer:
Computer Worms
Worms self-replicate and spread across networks, often degrading system performance by using up resources.
2796
An Endpoint Detection and Response (EDR) tool is more advanced than traditional antivirus because:
Answer:
It continuously monitors and records endpoint and network events to detect suspicious activity in real-time.
EDR solutions provide a deeper level of security by not just looking for known malware, but by monitoring for unusual behavior and providing tools for threat hunting and incident response, offering better protection against advanced persistent threats.
2797
A type of malware that infects the master boot record (MBR) of a hard drive is known as a:
Answer:
Boot sector virus.
A boot sector virus is a type of virus that infects the boot record of a hard disk or floppy disk. This allows the virus to load into memory before the operating system even starts, making it very difficult to detect and remove.
2798
An anti-exploit program is designed to:
Answer:
Prevent attackers from taking advantage of software vulnerabilities.
Anti-exploit technology is a proactive defense that focuses on blocking the techniques used to exploit software vulnerabilities, rather than trying to identify the malware itself. This can stop zero-day attacks that traditional antivirus might miss.
2799
A sudden and unexplained increase in your computer's internet data usage could be a symptom of:
Answer:
Your computer being part of a botnet and communicating with a command-and-control server.
If your computer is part of a botnet, it will communicate with the attacker's server to receive commands and send back data. This activity can lead to a noticeable spike in network traffic and data consumption.
2800
What term describes a self-replicating program, likened to a virus and inspired by a 1970s science fiction work?
Answer:
Worm
A computer worm is a standalone malware program that replicates itself to spread to other computers. Unlike a virus, it does not need to attach itself to an existing program. The term was inspired by the 1975 sci-fi novel "The Shockwave Rider" by John Brunner.