Computer Science for IGCSE & O level - The Internet And Its Uses (Section 10)

1
What is the main advantage of regularly backing up your data?
Answer
(B)
It helps you recover your data after a malware attack.
2
What does the term 'malware' stand for?
Answer
(A)
Malicious Software
3
What does the acronym 'HTTPS' stand for?
Answer
(A)
HyperText Transfer Protocol Secure
4
What type of attack aims to make a computer resource unavailable to its intended users?
Answer
(B)
Denial of Service
5
What is 'brute-force attack' primarily used for?
Answer
(B)
To gain unauthorized access by trying many password combinations.
6
In the context of passwords, what is the main goal of a brute-force attack?
Answer
(A)
To guess a password by trying many possibilities.
7
What is the purpose of a 'firewall'?
Answer
(B)
To control network traffic by filtering it.
8
What does the acronym 'HTTPS' stand for?
Answer
(A)
Hyper Text Transfer Protocol Secure
9
What is the function of the 'digital signature' in an SSL/TLS certificate?
Answer
(B)
To verify the authenticity and integrity of the certificate.
10
What is one of the key advantages of using a VPN?
Answer
B
C
11
Which of the following techniques are commonly used to protect against social engineering attacks?
Answer
A
B
C
12
Which of these measures can protect against social engineering attacks?
Answer
A
B
13
Which of the following statements best describes a proxy server?
Answer
(A)
A server that sits between the user and a web server, filtering web traffic.
14
Which of the following are methods for dealing with cyber security threats?
Answer
A
B
C
15
Which of the following is a common type of malware?
Answer
(C)
Trojan horse
16
What is a common method to mitigate the risk of a phishing attack?
Answer
(C)
Verifying the sender's email address.
17
What does the term 'URL' stand for?
Answer
(B)
Uniform Resource Locator
18
What technique is commonly used by hackers to gain access to Wi-Fi networks?
Answer
(C)
Wardriving
19
What is the main goal of a 'keylogger'?
Answer
(C)
To record every keystroke entered on a computer.
20
What is the primary function of a 'strong password'?
Answer
(B)
To prevent unauthorized access to your accounts.
21
What does a firewall typically do?
Answer
(C)
Filters network traffic based on pre-defined rules.
22
What are cookies?
Answer
(A)
Small files used to identify users.
23
What is the risk of downloading software from untrusted sources?
Answer
(B)
It could contain malware.
24
Which security measure is primarily designed to protect against unauthorized access to your computer system?
Answer
(B)
Installing a firewall.
25
What are two common types of anti-malware software?
Answer
(B)
Antivirus and anti-spyware
26
Which of the following is a characteristic of a 'cookie'?
Answer
(B)
It's a small text file stored on a user's computer by a website.
27
What is 'encryption'?
Answer
(A)
The process of converting plain text into an unreadable format.
28
What is a 'digital signature' used for?
Answer
(B)
To verify the authenticity and integrity of a digital document.
29
In the context of computers, what is a cookie?
Answer
(A)
A small text file a website stores on your computer.
30
Which of the following are common symptoms of a computer infected with malware?
Answer
A
B
C
31
What is the role of the web browser in accessing websites?
Answer
(B)
To interpret and display web pages.
32
What is one key aspect of a blockchain that makes it secure?
Answer
(B)
The immutability of its data (cannot be changed)
33
Which of the following are uses of SSL certificates?
Answer
A
B
D
34
What is a 'key term' that describes the process of verifying a user's identity using two methods of verification?
Answer
(B)
Two-factor authentication
35
Which of the following is a function of 'browsers'?
Answer
(A)
Locating and retrieving web pages.
36
What type of attack is a brute-force attack?
Answer
(A)
An attempt to guess a password by trying different combinations.
37
What is the main purpose of the Transport Layer Security (TLS) protocol?
Answer
(B)
To encrypt and secure data transmission over the internet.
38
What type of malware replicates itself to spread to other computers?
Answer
(B)
Virus.
39
Which is a characteristic of a blockchain?
Answer
(C)
It stores data in a distributed manner.
40
What is the biggest security risk when using public Wi-Fi?
Answer
(B)
Your data could be intercepted by others.
41
What type of information is most at risk during a phishing attack?
Answer
B
C
42
What is the primary function of a 'rootkit'?
Answer
(B)
To hide the presence of malware on a system.
43
What is the purpose of a 'cookie'?
Answer
(B)
To store user preferences and other information on a user's computer.
44
What is 'social engineering' in the context of cybersecurity?
Answer
(B)
A technique of manipulating individuals into divulging confidential information.
45
Which of the following is the best practice for creating a strong password?
Answer
(C)
Using a combination of uppercase and lowercase letters, numbers, and symbols.
46
What is one of the main risks associated with a brute force attack?
Answer
(B)
An unauthorized person could gain access to your account.
47
What is the main risk of downloading software from untrusted sources?
Answer
(B)
The software might contain malware.
48
What is 'malware' short for?
Answer
(A)
Malicious software
49
What is 'spyware' designed to do?
Answer
(B)
Monitor user activity and collect information.
50
What is the function of the DNS (Domain Name System)?
Answer
(B)
To translate website addresses into IP addresses.