Computer Science for IGCSE & O level - The Internet And Its Uses (Section 15)
1
What is the main goal of a 'man-in-the-middle' attack?
Answer(C)
To intercept communications between two parties.
2
What is the primary function of a firewall?
Answer(B)
To prevent unauthorized access to a network.
3
Which of the following is a type of anti-malware?
4
What is the role of encryption in digital currency?
Answer(B)
To prevent unauthorized access and secure transactions
5
What is the main characteristic of ransomware?
Answer(B)
It encrypts files and demands a ransom.
6
What is 'social engineering'?
Answer(C)
Manipulating people into revealing confidential information.
7
What does the term 'malware' encompass?
Answer(C)
Various types of harmful software, like viruses and spyware.
8
What is the main function of a firewall?
Answer(B)
To monitor and filter incoming and outgoing network traffic
9
Which of the following is a characteristic of spyware?
Answer(B)
It monitors user activity and gathers information
10
What is the main goal of a ransomware attack?
Answer(C)
To encrypt a user's data and demand a ransom for its release.
11
What is the purpose of two-factor authentication (2FA)?
Answer(B)
To increase the security of an account by requiring a second verification method.
12
What is the main goal of a denial-of-service (DoS) attack?
Answer(B)
To make a computer system unavailable.
13
What is the function of a web browser's cache?
Answer(B)
To store frequently accessed web page content for faster loading.
14
What is the main benefit of using HTTPS over HTTP?
Answer(C)
Secure and encrypted communication.
15
What is the main goal of a Distributed Denial of Service (DDoS) attack?
Answer(B)
To make a computer system unavailable to users.
16
Which of the following is NOT a function of a web browser?
17
Which of the following is the best practice for protecting your social media accounts?
Answer(C)
Regularly review your privacy settings.
18
What does 'HTTPS' stand for?
Answer(A)
HyperText Transfer Protocol Secure
19
What is the term used for tricking someone into revealing their personal information online?
20
Which of the following can be considered as Cyber Security Threats?
21
What does 'cookie' refer to in the context of internet security?
Answer(A)
A small file that websites store on a user's computer to remember information about them.
22
What is the purpose of a digital certificate?
Answer(B)
To verify the identity of a website or individual online.
23
What are some common characteristics of a phishing email?
24
What are session cookies primarily used for?
Answer(B)
Storing information about the user's current session.
25
What is a common security risk associated with using public Wi-Fi?
26
What does a 'strong password' usually contain?
Answer(C)
A mix of uppercase and lowercase letters, numbers, and symbols.
27
What security protocols does TLS perform?
28
Which of the following best describes 'social engineering'?
Answer(B)
Tricking people into revealing information
29
What are some best practices for creating strong passwords?
30
Which of the following describes the function of a web server?
Answer(B)
To store and deliver web pages and files.
31
What is the primary purpose of encryption?
Answer(B)
To protect data from unauthorized access.
32
What is a common security measure to protect against pharming attacks?
Answer(C)
Carefully checking the website address.
33
What does HTML stand for?
Answer(A)
Hyper Text Markup Language
34
What is the function of the 'refresh' or 'reload' button in a web browser?
Answer(C)
To update the current webpage with the latest content.
35
What is the purpose of a VPN (Virtual Private Network)?
Answer(B)
To encrypt internet traffic
36
What is meant by 'encryption'?
Answer(B)
The process of converting data into a code to prevent unauthorized access.
37
What does the abbreviation 'HTTPS' stand for?
Answer(A)
HyperText Transfer Protocol Secure
38
Why is it important to regularly back up your data?
Answer(B)
To protect your data from loss due to hardware failure, malware, or other events.
39
What is the main purpose of a DNS server?
Answer(B)
To translate domain names into IP addresses.
40
Which of the following are examples of where SSL would be used?
41
What is the term for software designed to damage or disrupt a computer system?
42
What type of attack is designed to prevent a user from accessing a website?
43
Which of the following is a typical feature of a web browser?
Answer(C)
Navigating between webpages using hyperlinks
44
What is a potential outcome of a successful phishing attack?
Answer(B)
Loss of personal information
45
What does the term 'pharming' refer to?
Answer(B)
Redirecting website traffic to a fake site without the user's knowledge.
46
What security measure helps to prevent unauthorized access to a user's computer?
47
What is the purpose of two-factor authentication (2FA)?
Answer(C)
To provide an extra layer of security by requiring two forms of identification.
48
What does a 'firewall' do?
Answer(B)
Controls network traffic to protect against unauthorized access.
49
Which type of attack involves tricking someone into providing sensitive information?
50
What is a Denial-of-Service (DoS) attack?
Answer(C)
An attack that overwhelms a server with traffic, making it unavailable.