Computer Science for IGCSE & O level - The Internet And Its Uses (Section 11)
1
What is the purpose of anti-virus software?
Answer(B)
To detect and remove malicious software.
2
Which of the following is a type of attack involving the use of deceptive emails?
3
What should you do if you find a suspicious device connected to your network?
4
What is the purpose of setting up a firewall?
Answer(B)
To filter network traffic based on predefined rules.
5
What term is used to describe a type of attack where an attacker attempts to flood a network or server with traffic to make it unavailable?
6
What does 'wardriving' involve?
Answer(D)
Searching for unsecured Wi-Fi networks.
7
What is 'social engineering' in the context of cyber security?
Answer(C)
Manipulating people to reveal sensitive information.
8
What is the purpose of a web browser's cache?
Answer(A)
To store temporary files to speed up website loading.
9
What should you do to protect your computer if you receive a suspicious email with an attachment?
Answer(D)
Scan the attachment with antivirus software before opening it.
10
What does the term 'pharming' refer to?
Answer(B)
A malicious redirect of a user's browser to a fake website.
11
Answer(B)
Sending deceptive emails to trick people into revealing sensitive information.
12
What does a URL use to identify a web page?
13
What is the difference between the Internet and the World Wide Web (WWW)?
Answer(B)
The Internet is the hardware and the WWW is the software that runs on it.
14
What is the purpose of anti-malware software?
Answer(A)
To identify and remove spyware.
15
Which of the following are types of cyber security threats?
16
Which of these are potential benefits of using a proxy server?
17
What is the meaning of the term 'URL'?
18
Which of the following is the most significant risk when you click on a phishing link?
Answer(C)
Your personal information may be stolen.
19
What is the primary objective of 'anti-spyware' software?
Answer(B)
To remove or mitigate the threat of malware.
20
Which of the following could be used to identify a phishing email?
21
In a URL, what does the part before the domain name (e.g., http://) represent?
22
Which of the following actions can help prevent malware infections?
23
Which of the following is NOT a type of malware?
24
What steps should you take to protect your online accounts?
25
What is the purpose of a digital certificate?
Answer(B)
To verify the identity of a website or user.
26
Which of the following is an example of social engineering?
27
Answer(B)
An address for accessing web resources.
28
What is the primary function of a proxy server?
Answer(B)
To act as an intermediary between a client and a server.
29
What type of internet connection is usually considered most secure?
30
What does the term 'malware' refer to?
Answer(B)
Malicious software designed to harm computer systems.
31
What is a common characteristic of a computer infected with a virus?
Answer(B)
Slow computer performance
32
What is the main function of a web browser?
Answer(B)
To access and display web pages.
33
What is the function of an ISP (Internet Service Provider)?
Answer(B)
To provide internet access to users.
34
What is a potential consequence of clicking on a suspicious link?
Answer(B)
You may download malware.
35
Why is it important to keep your software updated?
Answer(B)
To fix bugs and security vulnerabilities.
36
What are the potential risks associated with using a weak password?
37
Which of the following statements are correct regarding firewalls?
Answer(B)
Firewalls allow a user to set rules for network traffic.
38
What is the primary purpose of the internet?
Answer(B)
To facilitate communication and information sharing globally.
39
Which of the following techniques can be used to carry out data interception on a Wi-Fi network?
40
What is the common feature of blockchain?
41
Which of the following are important for a strong password?
42
What security measures can you take while using public Wi-Fi?
43
What is the purpose of a 'CAPTCHA'?
Answer(B)
To distinguish between human users and automated bots.
44
Which part of a URL comes after the domain name?
45
Which of these is a characteristic of a worm?
Answer(B)
Replicates itself without a host
46
What are the benefits of blockchain technology?
47
What is the main goal of a denial-of-service (DoS) attack?
Answer(B)
To make a website or service unavailable.
48
Which component of a URL is usually followed by the domain name?
Answer(C)
The protocol (e.g., http or https)
49
What is the primary function of a 'VPN' (Virtual Private Network)?
Answer(B)
To encrypt your internet traffic and mask your IP address.
50
When encountering a suspicious email, which action is the MOST important?
Answer(C)
Verify the sender and the email's content for legitimacy.