Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5221
The three main categories of authentication factors are "something you know," "something you have," and:
Answer:
"Something you are."
The three internationally recognized factors of authentication are:
5222
An alert from an IDS that says "Potential Port Scan Detected" means:
Answer:
An attacker is likely probing your network to see which ports are open and which services are running.
A port scan is a common reconnaissance technique used by attackers. They systematically check for open ports on your systems to identify potential vulnerabilities that can be exploited. An IDS is designed to detect this type of probing activity.
5223
What is a "digital certificate"?
Answer:
An electronic document used to prove the ownership of a public key.
A digital certificate, issued by a Certificate Authority, is like a digital passport. It contains information like the owner's name, the public key, the certificate's expiration date, and the digital signature of the CA, which vouches for the certificate's authenticity.
5224
An attacker sends a fraudulent email that appears to be from a senior executive in a company, instructing an employee in the finance department to make an urgent wire transfer. This is an example of:
Answer:
Business Email Compromise (BEC) or CEO fraud
This is a highly targeted form of spear phishing known as BEC or CEO fraud. The attacker uses social engineering, impersonation, and a sense of urgency to trick an employee into bypassing normal security procedures and making an unauthorized financial transaction.
5225
Which security measure, implemented as either hardware or software, is designed to prevent unauthorized access to a computer network?
Answer:
Firewall
A firewall acts as a critical barrier between a trusted internal network and an untrusted external network, such as the internet. It works by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Firewalls can be implemented as dedicated hardware appliances or as software running on a server or individual computer, making them a versatile tool for preventing unauthorized access and mitigating various cyber threats.
5226
A "packet-filtering" firewall operates at which layer of the OSI model?
Answer:
Layer 3 (Network) and Layer 4 (Transport)
A basic packet-filtering firewall makes its decisions based on information in the network and transport layer headers, such as source and destination IP addresses, ports, and the protocol type (TCP, UDP, ICMP).
5227
What is the primary function of an Intrusion Detection System (IDS)?
Answer:
To monitor network or system activities for malicious activity or policy violations and to produce reports or alerts.
An IDS is a passive monitoring tool, like a security camera. It watches network traffic and system logs, and if it detects something suspicious that matches a known attack signature or an anomaly, it generates an alert for a security administrator to investigate.
5228
Which authentication factor relies on an item that is exclusively owned and controlled by the legitimate user?
Answer:
Possession (Something you have)
This question describes the 'Possession' authentication factor. This factor validates a user's identity based on a physical item they possess, such as a smartphone (for software tokens or push notifications), a hardware security key (like a YubiKey), a smart card, or a one-time password (OTP) token. These items are typically unique to the user and are required to complete the authentication process.
Let's look at why the other options are incorrect:
* **Knowledge (Something you know)** refers to information only the user should know, like a password, PIN, or security question answer.
* **Inherence (Something you are)** refers to biometric factors, such as fingerprints, facial recognition, or iris scans.
* **Location (Somewhere you are)** is an additional context-aware authentication factor that verifies the user's geographical position, often used in conjunction with other factors, but it's not one of the primary 'Something you know/have/are' categories.
5229
What does "salting" a password mean in cryptography?
Answer:
Adding a unique, random string of characters to a password before it is hashed.
Salting is a crucial security measure for password storage. By adding a unique salt to each password before hashing, it ensures that two users with the same password will have different hashes. This prevents attackers from using pre-computed "rainbow tables" to crack the hashes.
5230
Which authentication factor is most susceptible to a shoulder surfing attack?
Answer:
Knowledge (PIN or password)
Shoulder surfing is the act of looking over someone's shoulder to see what they are typing. This makes knowledge-based factors like passwords and PINs, which must be visibly entered, the most vulnerable to this type of attack.