Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1
What is the term for hardware or software that protects against unauthorized access to a computer network?
Answer:
Firewall
A firewall is a fundamental cybersecurity tool that acts as a barrier between a private internal network and the public Internet. It can be implemented in either hardware or software and works by filtering incoming and outgoing traffic based on a set of security rules.
2
Which authentication factor categorizes methods that verify an individual's identity based on their intrinsic biological or physiological traits?
Answer:
A method leveraging unique biological characteristics, such as fingerprints or facial features.
Authentication factors are fundamental categories used to verify a user's identity. These are commonly grouped into three primary types: * **Something You Know (Knowledge Factor):** This factor relies on information that only the legitimate user is supposed to know. Examples include passwords, PINs, or security questions. Option A describes this type of factor. While widely used, knowledge factors can be vulnerable to forgetting, phishing, or brute-force attacks. * **Something You Have (Possession Factor):** This factor depends on a physical item that the user legitimately possesses. Examples include security tokens, smart cards, one-time password (OTP) generators (physical or app-based), or USB security keys. Option B describes this type of factor. Possession factors add a layer of security but can be compromised if the physical item is lost or stolen. * **Something You Are (Inherence Factor / Biometric Factor):** This factor authenticates an individual based on their unique, inherent biological or physiological characteristics. These traits are intrinsic to the person and difficult to replicate. Examples include fingerprints, facial recognition, iris scans, voice recognition, and even behavioral biometrics like typing patterns or gait. Option C accurately describes this 'something you are' category. Biometric methods are generally considered very strong forms of authentication due to the uniqueness and difficulty in falsifying these traits. * **Contextual or Behavioral Factors:** While not one of the primary three independent factors, contextual information often plays a role in multi-factor authentication (MFA) and adaptive authentication systems. Option D describes such a factor, which might include location, device type, time of day, or typical user behavior patterns. These factors help assess risk and refine authentication decisions but are usually used in conjunction with one or more of the primary three factors, rather than as a standalone primary factor.
3
Which of the following best describes the primary function of a firewall within a computer network?
Answer:
To act as a security barrier, regulating network traffic based on predefined rules to protect against unauthorized intrusions and cyber threats.
A firewall is a crucial component of network security. Its primary function is to monitor and control incoming and outgoing network traffic, acting as a gatekeeper between a trusted internal network and untrusted external networks (like the internet). It enforces pre-configured security rules to determine which traffic is allowed to pass and which is blocked. This capability is essential for preventing unauthorized access, blocking malware, and mitigating various cyberattacks, thus safeguarding the network's resources and data from malicious activities. Options A, B, and D describe functions typically performed by other network tools or services, such as network optimizers, spam filters, or web analytics tools, respectively, not the core function of a firewall.
4
What is the process that converts plaintext data into a secret code to protect it from unauthorized access?
Answer:
Encryption
Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key. This ensures that even if the data is intercepted, it cannot be understood by anyone without the correct key to decrypt it.
5
Which type of authentication factor verifies a user's identity by requiring them to present a unique physical object they personally control?
Answer:
Possession-based authentication (something you have)
Authentication factors are categorized methods for verifying a user's identity. Understanding these categories is crucial in cybersecurity: * **Knowledge-based authentication (something you know)** relies on discrete pieces of information that only the legitimate user should know. Examples include passwords, PINs, and answers to security questions. * **Inherence-based authentication (something you are)** utilizes unique biological or behavioral characteristics inherent to the user. This includes biometrics such as fingerprints, facial recognition, iris scans, and voice patterns. * **Possession-based authentication (something you have)** directly corresponds to the question's description. It requires the user to present a physical or digital item that they exclusively possess. Common examples include hardware security tokens (like USB keys, smart cards, or RSA SecurID tokens), or mobile devices used for one-time passwords (OTPs) or app-based authentication. The premise is that only the authorized user has physical control over this specific item. * **Contextual authentication (somewhere you are)**, while a valid authentication component, is typically considered a supplementary or environmental factor rather than one of the primary authentication types ('something you know,' 'something you are,' or 'something you have'). It involves verifying identity based on location (e.g., IP address, geofencing), time of access, device used, or behavioral patterns. The question specifically asks for an authentication factor relying on a 'physical item that they exclusively possess,' which precisely defines possession-based authentication.
6
Which authentication factor relies on information that only the legitimate user possesses, such as a secret phrase or a personal identification number?
Answer:
Knowledge
Authentication factors are categories of evidence used to verify a user's identity. * **Knowledge** factors (something you know) include passwords, PINs, security questions, or passphrases. These are secrets that the user is expected to recall and provide. * **Possession** factors (something you have) involve a physical item, such as a smart card, a security token, or a mobile phone used for one-time passcodes. * **Inherence** factors (something you are) utilize unique biological characteristics, like fingerprints, facial recognition, or iris scans. * **Location** (somewhere you are) and **Time** (sometime you are) are also sometimes considered authentication factors, especially in advanced adaptive authentication systems, but they are generally secondary or contextual factors. The question specifically asks for something 'only the user knows', which directly corresponds to 'Knowledge' factors.
7
What term describes the process of making code unreadable?
Answer:
Encryption
Encryption is the method of converting information or data into a code, especially to prevent unauthorized access. It transforms readable plaintext into unreadable ciphertext using an algorithm, making the original information secure.
8
A Unified Threat Management (UTM) appliance is a security product that typically combines:
Answer:
Multiple security features into a single device, such as a firewall, IDS/IPS, antivirus, and VPN.
A UTM device is an all-in-one security solution, often targeted at small-to-medium businesses. It simplifies security management by consolidating many different security functions into one piece of hardware.
9
In a firewall rule set, what is the purpose of the "implicit deny" principle?
Answer:
To ensure that any traffic that is not explicitly allowed by a preceding rule is blocked.
The implicit deny rule is a security best practice that is typically the last rule in a firewall's access control list. It states that if traffic does not match any of the preceding "allow" rules, it should be dropped. This creates a "default-deny" security posture.
10
A SYN flood is a type of what attack?
Answer:
Denial-of-Service
A SYN flood is a classic DoS attack that exploits the three-way handshake process of a TCP connection. The attacker sends a flood of SYN requests (the first step in the handshake) but never sends the final ACK packet, leaving the server with many half-open connections that consume its resources.