Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5191
What property of a hash function ensures that it is extremely difficult to find two different inputs that produce the same hash output?
Answer:
Collision resistance
Collision resistance is a critical property of a secure hash function. It should be computationally infeasible for anyone to find two distinct inputs, `x` and `y`, such that `hash(x) = hash(y)`.
5192
Using your fingerprint to unlock your smartphone is an example of which authentication factor?
Answer:
Inherence
The inherence factor refers to any biological trait unique to an individual. This includes biometrics like fingerprints, facial scans, iris scans, or voice patterns.
5193
An SQL Injection (SQLi) attack targets what component of a web application?
Answer:
The back-end database.
SQL Injection attacks exploit vulnerabilities in how a web application handles user input. By "injecting" malicious SQL code into a web form (like a search bar or login field), an attacker can manipulate the application's database to view, modify, or delete data.
5194
The concept of "Privacy by Design" means that:
Answer:
Privacy and data protection should be embedded into the design and architecture of systems and business practices from the very beginning.
Privacy by Design is a core principle of GDPR. It is a proactive, not reactive, approach that calls for privacy to be a fundamental component in the design and development of any new product, service, or process that involves personal data.
5195
An attacker attempts to gain access to an account by systematically trying every possible password combination. This is a:
Answer:
Brute-force attack
A brute-force attack is a trial-and-error method used to crack passwords or encryption keys. The attacker uses automated software to try a massive number of consecutive guesses until the correct one is found.
5196
What is deep packet inspection (DPI)?
Answer:
An advanced method of examining the content (payload) of a data packet, not just its header.
Unlike basic packet filtering, which only looks at header information (IP addresses, ports), DPI looks inside the data portion of the packet. This allows a firewall or IPS to identify specific applications, detect malware signatures, or prevent sensitive data from leaving the network.
5197
A one-time password (OTP) sent via an SMS text message to your phone is primarily leveraging which factor?
Answer:
Possession
While you must *know* the code, the security relies on the assumption that you are the only one in *possession* of the specific mobile phone and SIM card that can receive the SMS message.
5198
What is a "replay attack"?
Answer:
An attack where a valid data transmission is maliciously or fraudulently repeated or delayed.
In a replay attack, an attacker intercepts a data packet (e.g., a login request with credentials) and then "replays" it later to the server to impersonate the legitimate user. Encryption and session tokens are used to prevent this type of attack.
5199
What type of attack involves an attacker making a large number of DNS requests to a public DNS server but spoofing the source IP address to be the victim's IP?
Answer:
DNS amplification attack
This is a type of DDoS attack. The attacker sends a small query to a DNS server but crafts it in a way that elicits a much larger response. By spoofing the source IP, all these large responses are sent to the victim, overwhelming their network with traffic.
5200
Which cryptographic technique involves transforming data into an unreadable format to prevent unauthorized access?
Answer:
Encryption
Encryption is the process of converting readable data (plaintext) into an unreadable, encoded form (ciphertext) using a cryptographic algorithm and a key. This transformation ensures that only authorized individuals, who possess the correct decryption key, can revert the ciphertext back into its original, readable form. Its primary purpose is to secure data during transmission or storage, protecting its confidentiality from unauthorized interception or access. Decryption is the reverse process, while hashing creates a fixed-size string of characters from data for integrity checks, and digital signatures verify the authenticity and integrity of a digital message or document.