11 June, 2025

Graduate level MCQ question on Computer Science subject

Graduate level MCQ question on computeo


This requires moving beyond basic definitions and into deeper concepts and implications.


Here are 20 such MCQs, with explanations. 

Computer Viruses & Malware

 * Which of the following malware types primarily relies on a polymorphic engine for obfuscation, making signature-based detection challenging?

   a) Worm

   b) Trojan Horse

   c) Resident Virus

   d) File Infector Virus

   e) Polymorphic Virus

   Explanation: Polymorphic viruses are specifically designed to change their code with each infection, presenting different signatures. While other malware types might employ obfuscation, polymorphism is their defining characteristic for evasion.

 * A kernel-mode rootkit often employs which technique to hide its presence and malicious activities from security software?

   a) API hooking in user mode

   b) DLL injection

   c) SSDT (System Service Descriptor Table) hooking

   d) Registry modification in user space

   e) Network port scanning

   Explanation: SSDT hooking is a common kernel-mode rootkit technique where the rootkit modifies the pointers to legitimate system service functions in the kernel, redirecting calls to its own malicious code, thus making its processes, files, or network connections invisible to OS-level queries.

 * Which phase of an Advanced Persistent Threat (APT) attack typically involves using tools like Mimikatz or BloodHound for privilege escalation and network mapping?

   a) Initial Compromise

   b) Data Exfiltration

   c) Reconnaissance and Lateral Movement

   d) Command and Control (C2)

   e) Persistence

   Explanation: After initial compromise, APT actors engage in internal reconnaissance to understand the network topology and identify valuable assets, often using tools to discover credentials (Mimikatz) and map attack paths (BloodHound) for lateral movement within the network.

 * A "zero-day" vulnerability refers to a flaw for which:

   a) A patch has been released by the vendor but not yet applied.

   b) The vendor is unaware of the vulnerability, and no patch exists.

   c) It has been publicly disclosed and widely exploited for over a year.

   d) It only affects legacy systems and is no longer a threat.

   e) It requires physical access to exploit.

   Explanation: A zero-day vulnerability is a software flaw that is unknown to the vendor, meaning there are "zero days" for the vendor to have prepared a patch. This makes them particularly dangerous as attackers can exploit them before defenses are in place.

 * Which of the following best describes the principle behind a "memory-resident" virus?

   a) It encrypts all files on the hard drive and demands a ransom.

   b) It primarily infects documents and spreadsheets by exploiting macros.

   c) It spreads exclusively through network shares without user interaction.

   d) It loads itself into RAM and stays active, infecting files as they are accessed.

   e) It modifies the boot sector to execute on system startup.

   Explanation: A memory-resident virus installs itself into the computer's RAM. Once resident, it can infect other files or programs whenever they are accessed or executed, without needing to execute its original file again.

Antivirus & Cybersecurity

 * Heuristic analysis in antivirus software is most effective in detecting:

   a) Known viruses with specific, unchanging signatures.

   b) New or previously unseen malware based on suspicious behavior.

   c) Malware that relies solely on known operating system vulnerabilities.

   d) Legitimate software that has been incorrectly flagged.

   e) Hardware-level rootkits.

   Explanation: Heuristic analysis looks for suspicious behaviors or characteristics that deviate from typical program execution, making it effective against new or polymorphic malware where a direct signature match is not possible.

 * The primary purpose of a "sandbox" environment in a security context is to:

   a) Provide a secure channel for data transmission.

   b) Store encrypted backups of critical system files.

   c) Isolate and execute suspicious files in a controlled environment to observe their behavior.

   d) Detect and block network intrusion attempts in real-time.

   e) Encrypt entire disk partitions to prevent unauthorized access.

   Explanation: Sandboxing creates an isolated environment where potentially malicious code can be run without affecting the host system. This allows security software to observe its actions, identify malicious intent, and then take appropriate action.

 * Which of the following is a key advantage of using a "Threat Intelligence Platform (TIP)" in conjunction with an antivirus solution for an enterprise?

   a) It completely eliminates the need for manual security updates.

   b) It allows for offline malware analysis without an internet connection.

   c) It enables proactive defense by sharing real-time threat data and indicators of compromise (IoCs) across different security tools.

   d) It automates all patch management processes across the network.

   e) It primarily focuses on securing physical access to servers.

   Explanation: TIPs aggregate and analyze threat data from various sources, providing actionable intelligence (IoCs, attack patterns) that can be fed into security tools like antivirus, firewalls, and SIEMs to enhance proactive detection and response capabilities.

 * A common technique for an advanced persistent threat (APT) to maintain long-term access without easy detection is by creating a:

   a) Logic bomb activated by a specific date.

   b) Simple file infector virus.

   c) Backdoor or persistent access mechanism within legitimate system processes.

   d) Worm that spreads indiscriminately.

   e) Adware that redirects browser traffic.

   Explanation: APTs aim for stealth and long-term access. Creating backdoors or embedding themselves within seemingly legitimate processes helps them evade detection and re-establish access even if initial compromises are cleaned.

 * What is the primary function of a Security Information and Event Management (SIEM) system in enterprise cybersecurity, particularly in relation to antivirus alerts?

   a) To automatically quarantine all detected malware.

   b) To replace all individual antivirus solutions.

   c) To aggregate and correlate security events and logs from various sources, including antivirus, for centralized monitoring and analysis.

   d) To perform deep packet inspection on all network traffic.

   e) To solely manage user authentication and authorization.

   Explanation: A SIEM system collects security data (logs, alerts) from numerous sources (antivirus, firewalls, servers, applications). It then correlates these events to identify patterns, anomalies, and potential security incidents that individual tools might miss.

Supercomputers

 * Which of the following interconnect topologies is commonly chosen for supercomputers to minimize communication latency and maximize bandwidth, often resembling a high-dimensional mesh or torus?

   a) Bus

   b) Star

   c) Ring

   d) Fat Tree / Torus

   e) Daisy Chain

   Explanation: Fat Tree and Torus topologies are highly interconnected network structures designed to provide low latency and high bandwidth communication paths between a large number of nodes, crucial for the massive parallel processing in supercomputers.

 * The "Massively Parallel Processor (MPP)" architecture in supercomputing primarily emphasizes:

   a) A single, extremely powerful CPU.

   b) Thousands of independent processors, each with its own memory, communicating via a high-speed interconnect.

   c) Shared memory architecture with a few powerful multi-core CPUs.

   d) Specialized processors designed for graphics rendering.

   e) Relying on cloud-based virtual machines for scalability.

   Explanation: MPP systems are characterized by a large number of independent processing nodes, each with its own memory, connected by a dedicated high-speed network. This contrasts with shared-memory systems or single-processor designs.

 * What is the primary challenge addressed by "checkpointing" in large-scale supercomputing applications?

   a) Reducing the initial setup time for computations.

   b) Improving the user interface of parallel programs.

   c) Minimizing the impact of failures by periodically saving the application's state.

   d) Increasing the clock speed of individual processors.

   e) Optimizing data transfer rates to storage.

   Explanation: Given the high number of components in a supercomputer, failures are inevitable. Checkpointing involves periodically saving the entire state of a running parallel application to stable storage, allowing computation to resume from the last checkpoint rather than starting from scratch after a failure.

 * The term "FLOPS" (Floating Point Operations Per Second) is a key metric for supercomputer performance because:

   a) It measures the speed of data input/output.

   b) It indicates the number of memory accesses per second.

   c) Many scientific and engineering simulations heavily rely on floating-point arithmetic.

   d) It primarily measures integer operations, which are dominant.

   e) It quantifies the power consumption of the system.

   Explanation: Scientific and engineering applications that are the primary workload for supercomputers involve extensive calculations with real numbers, which are represented as floating-point numbers. Therefore, the ability to perform these operations quickly is a critical performance indicator.

 * Which programming model is most commonly used for explicit message passing between processes on distributed-memory supercomputers?

   a) OpenMP

   b) CUDA

   c) MPI (Message Passing Interface)

   d) POSIX Threads

   e) TBB (Threading Building Blocks)

   Explanation: MPI is the de-facto standard for programming distributed-memory systems like most large supercomputers. It provides functions for processes to explicitly send and receive data from each other, allowing for scalable parallel programming.

Quantum Computing

 * The fundamental principle that allows a qubit to exist in a superposition of both 0 and 1 simultaneously is:

   a) Entanglement

   b) Interference

   c) Superposition

   d) Decoherence

   e) Quantum tunneling

   Explanation: Superposition is the property of a quantum system existing in multiple states simultaneously until measured. This is a core difference between classical bits (0 or 1) and qubits (0, 1, or a combination of both).

 * Which of the following is the primary challenge that Quantum Error Correction (QEC) aims to mitigate in quantum computing?

   a) Overheating of quantum processors.

   b) The need for extremely large data storage.

   c) Decoherence and environmental noise affecting qubit states.

   d) The limitations of classical communication channels.

   e) The difficulty of fabricating quantum chips.

   Explanation: Qubits are extremely fragile and susceptible to noise from their environment, leading to decoherence (loss of quantum properties). QEC is crucial for protecting the fragile quantum information from these errors.

 * Shor's algorithm, if fully realized on a large-scale quantum computer, would pose a significant threat to which widely used cryptographic primitive?

   a) AES (Advanced Encryption Standard)

   b) Hash functions (e.g., SHA-256)

   c) RSA (Rivest-Shamir-Adleman) encryption

   d) Symmetric key cryptography

   e) One-time pad

   Explanation: Shor's algorithm can efficiently factor large numbers, which is the mathematical basis for the security of RSA and other public-key cryptosystems. This is why post-quantum cryptography is a critical area of research.

 * What defines "quantum entanglement" in the context of qubits?

   a) The ability of a qubit to represent multiple values.

   b) A phenomenon where two or more qubits become linked, such that the state of one instantaneously influences the state of the others, regardless of distance.

   c) The process of cooling qubits to extremely low temperatures.

   d) The interaction of qubits with classical computing components.

   e) The collapse of a superposition into a definite state upon measurement.

   Explanation: Entanglement is a unique quantum phenomenon where particles become correlated in such a way that they cannot be described independently. This property is fundamental to many quantum algorithms and communication protocols.

 * Post-Quantum Cryptography (PQC) primarily focuses on developing cryptographic algorithms that are:

   a) Faster than current classical algorithms.

   b) Resistant to attacks by large-scale quantum computers while running on classical computers.

   c) Capable of performing quantum computations themselves.

   d) Designed for secure communication between quantum computers.

   e) Primarily used for quantum key distribution.

   Explanation: PQC aims to create new classical cryptographic algorithms that are secure against attacks from both classical and future large-scale quantum computers, ensuring the continued security of digital communications and data in a post-quantum world.


Contact Form

Name

Email *

Message *

Related Posts Plugin for WordPress, Blogger...