Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5181
In a firewall rule set, what is the purpose of the "implicit deny" principle?
Answer:
To ensure that any traffic that is not explicitly allowed by a preceding rule is blocked.
The implicit deny rule is a security best practice that is typically the last rule in a firewall's access control list. It states that if traffic does not match any of the preceding "allow" rules, it should be dropped. This creates a "default-deny" security posture.
5182
A SYN flood is a type of what attack?
Answer:
Denial-of-Service
A SYN flood is a classic DoS attack that exploits the three-way handshake process of a TCP connection. The attacker sends a flood of SYN requests (the first step in the handshake) but never sends the final ACK packet, leaving the server with many half-open connections that consume its resources.
5183
What is a Time-based One-Time Password (TOTP)?
Answer:
A password that is based on the current time and is only valid for a short period (e.g., 30-60 seconds).
TOTP algorithms, used by most authenticator apps, generate a new code at a fixed interval (usually 30 seconds) based on a shared secret key and the current time. This ensures that each code is unique and expires quickly.
5184
What is a key difference between a "data controller" and a "data processor" under GDPR?
Answer:
The controller determines the purposes and means of processing personal data, while the processor processes data on behalf of the controller.
The controller is the entity that decides *why* and *how* personal data should be processed (e.g., the company collecting customer data). The processor is a separate entity that carries out the processing on the controller's instructions (e.g., a third-party cloud provider storing the data).
5185
What is the "non-repudiation" property provided by digital signatures?
Answer:
It ensures that the sender of a message cannot later deny having sent the message.
Non-repudiation provides proof of origin. Because a digital signature can only be created with the sender's unique private key, it serves as undeniable proof that the sender was the one who signed and sent the message.
5186
What is a "backup code" in the context of MFA?
Answer:
A set of single-use codes provided when you set up MFA, which you can use to log in if you lose access to your second factor.
When you enable MFA, most services will provide you with a list of 8-10 backup codes. It is crucial to store these codes in a safe place (e.g., a password manager or a safe) so you can regain access to your account if you lose your phone.
5187
What is the primary purpose of a digital signature?
Answer:
To provide authenticity, integrity, and non-repudiation for a digital message.
A digital signature, created using the sender's private key, proves that the message was sent by the claimed sender (authenticity), that the message has not been altered (integrity), and that the sender cannot deny sending it (non-repudiation).
5188
What is "Personally Identifiable Information" (PII)?
Answer:
Any information that can be used to identify a specific individual.
PII is a broad term for any data that could be used, on its own or in combination with other information, to identify, contact, or locate a single person. This can include a name, social security number, email address, or even an IP address in some contexts.
5189
Biometric authentication (like Face ID) is convenient, but what is a potential drawback?
Answer:
Biometric data, if stolen, cannot be changed like a password.
The primary concern with biometrics is that if a database containing your fingerprint or facial scan data is breached, you cannot simply "reset" your face or fingerprint. This makes the secure storage and handling of biometric data critically important.
5190
A "Next-Generation Firewall" (NGFW) typically includes what advanced capability?
Answer:
All of the above.
NGFWs go beyond traditional port and protocol inspection. They are "application-aware," meaning they can identify and control specific applications (like Facebook or Dropbox), perform deep packet inspection to look for threats within the data itself, and often have built-in IPS capabilities.