Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
1
Which of the following is NOT a principle of data privacy?
Answer:
Data maximization
Data maximization is not a principle of data privacy. Principles like data minimization (collecting only necessary data), purpose limitation (using data only for specified reasons), and accountability (being responsible for data handling) are fundamental to privacy regulations.
2
What is the purpose of data anonymization?
Answer:
To remove or modify personally identifiable information (PII) from data to prevent direct identification of individuals
Data anonymization is the process of removing or obscuring personally identifiable information (PII) from data so that individuals cannot be directly identified. This is crucial for privacy and compliance, especially when data is used for analysis or research.
3
What is the primary concept behind 'data encryption at rest'?
Answer:
Encrypting data that is stored on a disk, database, or any static storage
Data encryption at rest refers to encrypting data while it is stored on physical storage media, such as hard drives, SSDs, or in databases. This protects the data even if the storage device is physically stolen or accessed without authorization.
4
What specifically does 'data in transit' refer to?
Answer:
Data moving across a network, from one system to another
Data in transit (or data in motion) refers to data that is actively moving from one location to another across a computer network, such as over the internet, intranet, or within a private cloud environment.
5
What is the purpose of a 'digital certificate'?
Answer:
To verify the identity of a website or user and enable encrypted communication
Digital certificates (like SSL/TLS certificates) are used to cryptographically bind a public key to an entity (e.g., website, individual). They verify the identity of the certificate holder and enable secure, encrypted communication, assuring users of authenticity.
6
What is a VPN primarily used for in terms of security?
Answer:
To create a secure, encrypted connection over a less secure network like the internet
A Virtual Private Network (VPN) creates an encrypted tunnel over a public network, allowing users to send and receive data securely as if their computing devices were directly connected to the private network. This enhances confidentiality and integrity.
7
An attacker sends an email pretending to be your bank, asking you to click a link and verify your account details. What type of attack is this?
Answer:
Phishing attack
This scenario perfectly describes a phishing attack, where an attacker impersonates a trustworthy entity (your bank) to trick you into revealing sensitive information via fraudulent means.
8
What is phishing?
Answer:
An attempt to trick users into revealing sensitive information by disguised as a trustworthy entity
Phishing is a social engineering technique where attackers try to deceive individuals into revealing sensitive information like usernames, passwords, and credit card details, often through fraudulent emails or websites.
9
Which attack exploits vulnerabilities in web browsers or plugins by injecting malicious scripts into legitimate websites?
Answer:
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) attacks allow attackers to inject client-side scripts into web pages viewed by other users. This can lead to session hijacking, defacement of websites, or redirection to malicious sites.
10
What is the primary risk associated with using public Wi-Fi without a VPN?
Answer:
Exposure to eavesdropping and data interception
Public Wi-Fi networks are often unsecured, making it easy for attackers to intercept data transmitted between your device and the network. A VPN encrypts your traffic, protecting it from eavesdropping.