Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2881
What is 'tokenization' in data security?
Answer:
Replacing sensitive data with a unique, non-sensitive identifier (token)
Tokenization is a data security technique where sensitive data (e.g., credit card numbers) is replaced with a randomly generated, non-sensitive equivalent (a token). This token can then be used in systems without exposing the original sensitive data, enhancing security and reducing compliance scope.
2882
Which regulation focuses on the protection of personal data and privacy within the European Union?
Answer:
GDPR
The General Data Protection Regulation (GDPR) is a comprehensive data protection law in the European Union and European Economic Area. It imposes strict rules on how personal data is collected, stored, and processed.
2883
What is the term for hardware or software that protects against unauthorized access to a computer network?
Answer:
Firewall
A firewall is a fundamental cybersecurity tool that acts as a barrier between a private internal network and the public Internet. It can be implemented in either hardware or software and works by filtering incoming and outgoing traffic based on a set of security rules.
2884
Which authentication factor categorizes methods that verify an individual's identity based on their intrinsic biological or physiological traits?
Answer:
A method leveraging unique biological characteristics, such as fingerprints or facial features.
Authentication factors are fundamental categories used to verify a user's identity. These are commonly grouped into three primary types: * **Something You Know (Knowledge Factor):** This factor relies on information that only the legitimate user is supposed to know. Examples include passwords, PINs, or security questions. Option A describes this type of factor. While widely used, knowledge factors can be vulnerable to forgetting, phishing, or brute-force attacks. * **Something You Have (Possession Factor):** This factor depends on a physical item that the user legitimately possesses. Examples include security tokens, smart cards, one-time password (OTP) generators (physical or app-based), or USB security keys. Option B describes this type of factor. Possession factors add a layer of security but can be compromised if the physical item is lost or stolen. * **Something You Are (Inherence Factor / Biometric Factor):** This factor authenticates an individual based on their unique, inherent biological or physiological characteristics. These traits are intrinsic to the person and difficult to replicate. Examples include fingerprints, facial recognition, iris scans, voice recognition, and even behavioral biometrics like typing patterns or gait. Option C accurately describes this 'something you are' category. Biometric methods are generally considered very strong forms of authentication due to the uniqueness and difficulty in falsifying these traits. * **Contextual or Behavioral Factors:** While not one of the primary three independent factors, contextual information often plays a role in multi-factor authentication (MFA) and adaptive authentication systems. Option D describes such a factor, which might include location, device type, time of day, or typical user behavior patterns. These factors help assess risk and refine authentication decisions but are usually used in conjunction with one or more of the primary three factors, rather than as a standalone primary factor.
2885
Which of the following best describes the primary function of a firewall within a computer network?
Answer:
To act as a security barrier, regulating network traffic based on predefined rules to protect against unauthorized intrusions and cyber threats.
A firewall is a crucial component of network security. Its primary function is to monitor and control incoming and outgoing network traffic, acting as a gatekeeper between a trusted internal network and untrusted external networks (like the internet). It enforces pre-configured security rules to determine which traffic is allowed to pass and which is blocked. This capability is essential for preventing unauthorized access, blocking malware, and mitigating various cyberattacks, thus safeguarding the network's resources and data from malicious activities. Options A, B, and D describe functions typically performed by other network tools or services, such as network optimizers, spam filters, or web analytics tools, respectively, not the core function of a firewall.
2886
What is the process that converts plaintext data into a secret code to protect it from unauthorized access?
Answer:
Encryption
Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key. This ensures that even if the data is intercepted, it cannot be understood by anyone without the correct key to decrypt it.
2887
Which type of authentication factor verifies a user's identity by requiring them to present a unique physical object they personally control?
Answer:
Possession-based authentication (something you have)
Authentication factors are categorized methods for verifying a user's identity. Understanding these categories is crucial in cybersecurity: * **Knowledge-based authentication (something you know)** relies on discrete pieces of information that only the legitimate user should know. Examples include passwords, PINs, and answers to security questions. * **Inherence-based authentication (something you are)** utilizes unique biological or behavioral characteristics inherent to the user. This includes biometrics such as fingerprints, facial recognition, iris scans, and voice patterns. * **Possession-based authentication (something you have)** directly corresponds to the question's description. It requires the user to present a physical or digital item that they exclusively possess. Common examples include hardware security tokens (like USB keys, smart cards, or RSA SecurID tokens), or mobile devices used for one-time passwords (OTPs) or app-based authentication. The premise is that only the authorized user has physical control over this specific item. * **Contextual authentication (somewhere you are)**, while a valid authentication component, is typically considered a supplementary or environmental factor rather than one of the primary authentication types ('something you know,' 'something you are,' or 'something you have'). It involves verifying identity based on location (e.g., IP address, geofencing), time of access, device used, or behavioral patterns. The question specifically asks for an authentication factor relying on a 'physical item that they exclusively possess,' which precisely defines possession-based authentication.
2888
Which authentication factor relies on information that only the legitimate user possesses, such as a secret phrase or a personal identification number?
Answer:
Knowledge
Authentication factors are categories of evidence used to verify a user's identity. * **Knowledge** factors (something you know) include passwords, PINs, security questions, or passphrases. These are secrets that the user is expected to recall and provide. * **Possession** factors (something you have) involve a physical item, such as a smart card, a security token, or a mobile phone used for one-time passcodes. * **Inherence** factors (something you are) utilize unique biological characteristics, like fingerprints, facial recognition, or iris scans. * **Location** (somewhere you are) and **Time** (sometime you are) are also sometimes considered authentication factors, especially in advanced adaptive authentication systems, but they are generally secondary or contextual factors. The question specifically asks for something 'only the user knows', which directly corresponds to 'Knowledge' factors.
2889
What term describes the process of making code unreadable?
Answer:
Encryption
Encryption is the method of converting information or data into a code, especially to prevent unauthorized access. It transforms readable plaintext into unreadable ciphertext using an algorithm, making the original information secure.
2890
What are coded entries used to gain access to a computer system called?
Answer:
Passwords
A password is a secret word or string of characters used for authentication to prove identity or gain access to a resource. It is the most common mechanism used to control access to computer systems, applications, and data.