Computer Science for IGCSE & O level - The Internet And Its Uses (Section 1)
1
Which of the following can you do to improve your online security?
2
What is the biggest risk of using public Wi-Fi networks without a VPN?
Answer(C)
Your data can be easily intercepted by others on the network.
3
What is the purpose of encryption?
Answer(C)
To convert data into an unreadable format.
4
Which of the following describes aspects of digital currency?
5
What is the purpose of HTTP and HTTPS?
Answer(D)
To transfer and display information between servers and browsers
6
What is the primary purpose of an Access Control List (ACL)?
Answer(B)
To control which users or systems have access to specific resources.
7
What technology is used for accessing web pages?
8
In the context of phishing, what is "typosquatting"?
Answer(B)
Registering a domain name that closely resembles a legitimate one
9
A school is using fingerprints to uniquely identify each student. What is the system being used for?
Answer(C)
A register instead of the existing manual system
10
What is the main goal of a 'denial-of-service' attack?
Answer(C)
To make a computer resource unavailable.
11
What are 'persistent cookies' primarily used for?
Answer(B)
Tracking a user's browsing activity over time and across multiple websites.
12
Which of the following actions can help prevent cyber security threats?
13
What is a 'firewall' primarily designed to do?
14
Which of the following is a core component of the World Wide Web?
15
What are some benefits of using blockchain technology?
16
Answer(B)
A network of computers infected with malware and controlled remotely.
17
What is the main goal of 'ethical hacking'?
Answer(B)
To find vulnerabilities and improve security.
18
What is a 'brute-force attack'?
Answer(B)
An attempt to guess a password by trying every possible combination.
19
What does 'HTTPS' stand for?
Answer(A)
Hypertext Transfer Protocol Secure
20
Which type of attack attempts to trick a user into revealing their login credentials?
21
What is the purpose of the 'handshake protocol' in TLS?
Answer(C)
To establish a secure connection by authenticating parties and negotiating encryption parameters.
22
Which of the following is an example of a top-level domain?
23
Which of the following actions could a hacker take in a 'brute force attack'?
24
What are some common techniques used by attackers in social engineering?
25
What is a common technique used in 'phishing' attacks?
26
What term describes a program that replicates itself, often with the intent of corrupting a computer system?
27
What does the 'S' in HTTPS indicate?
28
Which of the following can contribute to the strength of a password?
29
Which of the following are the components of a URL?
30
What is the primary function of a 'router'?
Answer(B)
To connect multiple networks and forward data packets between them.
31
Which of the following is a characteristic of a phishing attack?
Answer(D)
Uses deception to get private information.
32
What is the role of the browser in accessing web pages?
Answer(B)
To display and interact with web content.
33
What is the main purpose of a cookie?
Answer(A)
To store user information.
34
What is the primary function of a 'firewall'?
Answer(B)
To filter network traffic.
35
What is the function of a web browser’s address bar?
Answer(C)
To enter the URL of the website.
36
What does the term 'tailgating' refer to in the context of social engineering?
Answer(B)
Following someone through a restricted area.
37
What is the role of a password manager?
Answer(A)
To create and store strong, unique passwords.
38
What should you do if you find a suspicious file on your computer?
Answer(B)
Run a scan with your antivirus software.
39
Which of the following is a common method used to prevent unauthorized access to data?
40
Which practices can reduce the risk of a 'brute-force' attack?
41
Which of the following actions can a user take to protect themselves against phishing attacks?
42
Which of the following is a characteristic of 'ransomware'?
43
Which of the following can help protect against a 'man-in-the-middle' attack?
44
What are potential signs of a 'pharming' attack?
45
Which of the following factors can make your password stronger?
46
What does the 'S' in HTTPS stand for?
47
What is the primary goal of a denial-of-service (DoS) attack?
Answer(B)
To make a computer or network unavailable to users.
48
What is the primary purpose of a DNS lookup?
Answer(C)
To translate domain names to IP addresses.
49
What is the main purpose of a CAPTCHA?
Answer(B)
To identify a human user and prevent automated bots from accessing a website.
50
What does the term "vishing" refer to in the context of cybersecurity?
Answer(B)
Phishing through voice calls.