Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
5301
What is a key principle of the GDPR regarding user consent?
Answer:
Consent must be freely given, specific, informed, and unambiguous.
Under GDPR, companies cannot use pre-ticked boxes or confusing language to obtain consent. Users must make a clear, affirmative action to consent to the processing of their personal data, and they must be able to withdraw that consent at any time.
5302
What is the primary defense against SQL Injection attacks?
Answer:
Using parameterized queries (prepared statements) and input validation.
The most effective way to prevent SQLi is through secure coding practices. Parameterized queries ensure that user input is treated as data only and cannot be executed as SQL code. Input validation also helps by sanitizing and rejecting malicious input.
5303
In symmetric-key cryptography, how many keys are used?
Answer:
One key
Symmetric encryption uses a single, shared secret key for both the encryption and decryption processes. This method is generally very fast but has the challenge of securely sharing the key between the sender and receiver.
5304
What is "spear phishing"?
Answer:
A phishing attack that is highly targeted at a specific individual, group, or organization.
Unlike general phishing, which is a wide-net approach, spear phishing is a targeted attack. The attacker researches the target and crafts a personalized email to make it appear more credible, significantly increasing the likelihood of success.
5305
In asymmetric-key cryptography, the public key is used for _____ and the private key is used for _____.
Answer:
encryption; decryption
Asymmetric (or public-key) cryptography uses a pair of keys. The public key, which can be shared with anyone, is used to encrypt data. The corresponding private key, which must be kept secret by the owner, is the only key that can decrypt the data.
5306
Which of these is a behavioral biometric?
Answer:
Keystroke dynamics (the rhythm and speed of your typing)
Behavioral biometrics authenticate a user based on the unique patterns in their actions, rather than their physical characteristics. Keystroke dynamics, gait (how you walk), and mouse movement patterns are all examples of behavioral biometrics.
5307
The General Data Protection Regulation (GDPR) is a comprehensive data privacy law enacted by what body?
Answer:
The European Union
The GDPR is a landmark regulation from the European Union that was put into effect in May 2018. It is designed to protect the personal data and privacy of EU citizens and has had a major impact on data handling practices worldwide.
5308
A law that requires a business to implement reasonable security measures to protect the personal information it collects is known as a:
Answer:
A) Data security law.
Many jurisdictions have laws that place a direct legal obligation on businesses to take appropriate technical and organizational steps to secure the personal data they hold against loss, theft, or unauthorized access.
5309
An attacker positions themselves between two communicating parties to intercept, read, and possibly alter the messages without their knowledge. This is known as a:
Answer:
Man-in-the-Middle (MitM) attack
In a Man-in-the-Middle attack, the attacker secretly intercepts and relays communications. A common example is an attacker on a public Wi-Fi network intercepting traffic between a user and a website to steal login credentials or financial information.
5310
Using your location (geofencing) as part of an authentication decision is leveraging which potential factor?
Answer:
Context or location
Location is sometimes considered a fourth category of authentication factor. A system could, for example, only allow logins from within a specific office building, adding a layer of security based on the user's physical location.