Computer Science for IGCSE & O level - The Internet And Its Uses (Section 14)
1
What is the purpose of cookies?
Answer(C)
To store information about a user's browsing activity.
2
What is a key characteristic of a DDoS attack?
Answer(C)
It aims to make a server unavailable.
3
Which of the following is a potential risk associated with using free Wi-Fi?
Answer(C)
Data interception by hackers.
4
Which of the following is a function of a cookie?
5
Why is it important to keep your software, including your operating system, updated?
Answer(C)
To fix security vulnerabilities and bugs.
6
What is the primary purpose of a keylogger?
Answer(B)
To record everything typed on a keyboard.
7
Which type of malware disguises itself as legitimate software?
8
Answer(A)
The unique address of a website
9
What does the lock icon in the address bar of a web browser indicate?
Answer(A)
That the website has a secure connection using SSL
10
Which of the following is a sign of a potentially phishing email?
Answer(C)
A request for personal information.
11
What is the function of a 'firewall' in the context of cyber security?
Answer(B)
To protect a network from unauthorized access.
12
Which type of data is usually stored in the blockchain?
13
What is the main purpose of a Distributed Denial of Service (DDoS) attack?
Answer(B)
To disrupt network services
14
Which part of a URL identifies the specific location of a resource on a web server?
15
What is the role of a web server?
Answer(B)
To store, process and deliver web pages to users.
16
What is the meaning of a URL?
Answer(A)
Uniform Resource Locator (the address of a website).
17
What is the function of a session cookie?
Answer(C)
To maintain a user's login session.
18
In the context of the internet, what does the term 'protocol' refer to?
Answer(B)
A set of rules and standards for communication.
19
Which of the following is an example of social engineering?
20
What are the potential problems identified in a phishing email?
21
What does the term 'spoofing' refer to in the context of cybersecurity?
Answer(B)
Falsifying the identity of a user or device.
22
What is the purpose of HTTPS (Hypertext Transfer Protocol Secure)?
Answer(B)
To encrypt data transmitted between a web browser and a server.
23
What is 'two-factor authentication' (2FA) designed to do?
Answer(C)
Add an extra layer of security to your accounts.
24
What is the primary function of JavaScript in a web page?
Answer(C)
To make a web page interactive.
25
Which protocol is typically used for secure communication over the internet?
26
What features do persistent cookies have?
27
In a URL, what does the 'www' typically indicate?
28
What is the primary goal of a 'ransomware' attack?
Answer(C)
To encrypt a user's data and demand payment for its release.
29
Which of the following is a good security practice when using public Wi-Fi?
30
What is 'social engineering'?
Answer(B)
Manipulating people into divulging confidential information.
31
What is the main purpose of a web browser's cache?
Answer(B)
To store frequently accessed webpage data to load them more quickly.
32
What can you do to protect yourself from a phishing attack?
Answer(C)
Check the sender's email address
33
What is a common technique used in phishing attacks?
Answer(C)
Creating fake websites that look like real ones.
34
What is the role of 'data interdiction' in the context of cyber security?
35
What type of software allows users to access and view web pages?
36
What is the meaning of 'URL'?
Answer(B)
Universal Resource Locator
37
What is the purpose of a 'phishing' attack?
Answer(B)
To trick users into revealing sensitive information.
38
Which of these is NOT a common feature of a password manager?
Answer(D)
Sharing passwords with anyone without restriction.
39
What is the purpose of a CAPTCHA?
Answer(B)
To distinguish between human users and bots.
40
What is the definition of 'spam'?
Answer(B)
Unsolicited electronic messages, often sent in bulk.
41
Which of the following is a sign of possible malware infection?
42
What does the abbreviation 'ISP' stand for?
Answer(C)
Internet Service Provider.
43
What does HTTP stand for?
Answer(A)
HyperText Transfer Protocol
44
What is a common goal of a phishing attack?
Answer(B)
To steal user credentials.
45
What does DDoS stand for?
Answer(A)
Distributed Denial-of-Service
46
What is the role of a 'cookie' in web browsing?
Answer(C)
To store information about a user's browsing activity.
47
What type of malware is designed to secretly gather information about a user?
48
Which of the following is an example of two-factor authentication?
Answer(C)
A password and a code sent to your phone.
49
What is the main characteristic of a Blockchain?
Answer(B)
Tamper-proof and immutable data storage
50
What is the function of a 'search engine'?
Answer(C)
To locate information on the internet based on user queries