Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2841
What is 'data minimization' in the context of privacy?
Answer:
Collecting and processing only the personal data that is absolutely necessary for a specific purpose
Data minimization is a core principle of privacy regulations like GDPR. It advocates for collecting and storing only the data that is essential for a specific, stated purpose, reducing the risk in case of a breach.
2842
Which of the following describes a 'keylogger'?
Answer:
Malware that records every keystroke made on a computer
A keylogger is a type of surveillance software that has the ability to record every keystroke made on the target computer. It is often used by attackers to steal passwords, credit card numbers, and other sensitive information.
2843
What is the primary goal of cybersecurity?
Answer:
To protect systems and data from digital attacks
The primary goal of cybersecurity is to protect computer systems, networks, and data from digital attacks, damage, or unauthorized access. While confidentiality, integrity, and availability (CIA triad) are key principles, the overarching goal is the comprehensive protection against threats.
2844
What is considered a 'supply chain attack' in cybersecurity?
Answer:
An attack that targets less secure elements in the supply chain to gain access to the main target
A supply chain attack targets organizations by compromising a weaker link in their supply chain, such as a trusted third-party vendor or software component. By injecting malicious code or exploiting vulnerabilities in these components, attackers gain access to the main target.
2845
Which of the following is an example of strong password practice?
Answer:
Using a combination of uppercase and lowercase letters, numbers, and symbols
Strong passwords are long, complex, and unique. They incorporate a mix of character types (uppercase, lowercase, numbers, symbols) to make them difficult to guess or crack.
2846
What does 'integrity' refer to in the context of cybersecurity?
Answer:
Maintaining the accuracy, consistency, and trustworthiness of data over its entire lifecycle
Integrity, another component of the CIA triad, ensures that data has not been altered or destroyed in an unauthorized manner. It means the data is accurate, complete, and reliable.
2847
What is a 'brute-force attack' in the context of password cracking?
Answer:
An attack that attempts to guess a password by systematically trying every possible combination of characters until the correct one is found
A brute-force attack is a trial-and-error method used by applications to decode encrypted data, such as passwords or decryption keys. It involves systematically checking all possible combinations until the correct one is found.
2848
Which body typically sets industry standards for information security, often used for certification?
Answer:
ISO (International Organization for Standardization)
The International Organization for Standardization (ISO) develops various standards, including those for information security management systems (e.g., ISO/IEC 27001). These standards provide a framework for organizations to manage and protect their information assets.
2849
What is the purpose of a firewall?
Answer:
To filter network traffic and block unauthorized access
A firewall acts as a barrier between a trusted internal network and untrusted external networks (like the internet), controlling inbound and outbound network traffic based on predefined security rules.
2850
Which of the following is an example of 'biometric authentication'?
Answer:
Using a fingerprint scan or facial recognition
Biometric authentication verifies a person's identity based on unique physiological (e.g., fingerprints, facial features) or behavioral (e.g., voice, gait) characteristics. It's 'something you are'.