Computer Science for IGCSE & O level - The Internet And Its Uses (Section 13)

1
What are the potential risks associated with using public Wi-Fi networks?
Answer
A
B
C
2
Which of the following is a potential threat when downloading files from the internet?
Answer
A
B
3
What does 'malware' stand for?
Answer
(C)
Malicious Software
4
What does a Trojan horse do?
Answer
(B)
It hides itself within a legitimate program.
5
What should you do if you receive a suspicious email with an attachment?
Answer
(C)
Delete the email or scan the attachment with antivirus software before opening.
6
What is the most effective way to prevent a virus infection?
Answer
(D)
Using updated anti-virus software
7
What can happen if a user clicks a link on a website that has not been properly secured?
Answer
(B)
The user might expose their personal information.
8
What is Digital Currency?
Answer
(C)
Money only existing as data on a computer system.
9
What can be done with digital currency?
Answer
A
B
C
10
What is the difference between a session cookie and a persistent cookie?
Answer
(A)
Session cookies expire when the browser is closed; persistent cookies remain.
11
What is a 'denial-of-service' (DoS) attack?
Answer
(C)
An attack that floods a server with traffic to make it unavailable.
12
Which security practices should you follow to stay safe online?
Answer
A
B
C
13
Which type of malware replicates itself and spreads to other computers without human interaction?
Answer
(B)
Worm
14
Which of the following are examples of social engineering techniques?
Answer
A
B
C
15
What are the potential consequences of a data breach?
Answer
(A)
Identity theft, financial loss, and reputation damage.
16
Which of the following is an example of a strong password?
Answer
(C)
P@$$wOrd2024
17
Which of the following are types of cyber security threats?
Answer
A
B
C
D
18
What are some common steps in a social engineering attack?
Answer
A
B
C
19
What does the acronym 'HTML' refer to?
Answer
(A)
Hyper Text Markup Language
20
Which of the following is a characteristic of digital currency?
Answer
(C)
It is only electronic.
21
What type of malware is a program that is disguised as legitimate software?
Answer
(C)
Trojan horse
22
What is the main function of a blockchain?
Answer
(C)
Transparency and Security
23
Which practices help to protect your computer from malware?
Answer
A
B
C
24
Which component of a URL specifies the website address?
Answer
(B)
Domain name
25
What is the function of HTML?
Answer
(B)
To create the structure and presentation of web pages.
26
What is the goal of a 'man-in-the-middle' attack?
Answer
(B)
To intercept and potentially modify communications.
27
Which type of attack is characterized by sending unsolicited emails to a large number of recipients?
Answer
(B)
Spam
28
What does 'HTTPS' in a website address indicate?
Answer
(B)
HyperText Transfer Protocol Secure
29
What is a benefit of using a strong password?
Answer
(A)
It makes your account less susceptible to hacking.
30
What does the 'www' at the start of a web address stand for?
Answer
(B)
World Wide Web
31
Which of the following activities is an example of ethical hacking?
Answer
(B)
Finding security vulnerabilities with the owner's permission
32
What is a common characteristic of a Trojan horse?
Answer
(B)
It is disguised as legitimate software.
33
What does 'HTTPS' stand for?
Answer
(A)
HyperText Transfer Protocol Secure
34
Which of the following actions help to mitigate the risks associated with spyware?
Answer
A
B
D
35
Which of the following is a disadvantage of retina scans as a biometric method?
Answer
(A)
It is very slow.
36
In the context of blockchain, what does 'decentralization' mean?
Answer
(C)
Distributed across multiple computers or nodes.
37
What does the term 'pharming' describe?
Answer
(B)
The act of redirecting website traffic to a fake website.
38
What does a VPN (Virtual Private Network) do?
Answer
(B)
Encrypts your internet traffic and masks your IP address.
39
What is a 'botnet' used for?
Answer
(B)
To control a network of infected computers for malicious purposes.
40
What is a 'digital certificate' used for?
Answer
(B)
To verify the authenticity of a website.
41
What is the role of a digital certificate in securing online communications?
Answer
(B)
To verify the identity of a website.
42
What is the definition of 'malware'?
Answer
(B)
Malicious software designed to harm or disrupt computer systems.
43
What is the role of the Certificate Authority (CA) in the TLS handshake?
Answer
(A)
To issue digital certificates.
44
What is the primary aim of a DoS (Denial of Service) attack?
Answer
(B)
To make a service unavailable.
45
What are some ways to protect your computer from malware?
Answer
A
B
C
46
What is a cookie?
Answer
(B)
A small text file that a website stores on a user's computer.
47
What is the primary function of an IP address?
Answer
(B)
To uniquely identify devices on a network.
48
What is the definition of a DDoS attack?
Answer
(D)
An attack where multiple compromised systems are used to flood a target with traffic.
49
Which of the following is an advantage of using a firewall?
Answer
(D)
It helps protect your computer from unauthorized access.
50
What does the term 'encryption' mean in cybersecurity?
Answer
(B)
The process of converting data into a code to prevent unauthorized access.