Computer Science for IGCSE & O level - The Internet And Its Uses (Section 16)

1
What is the purpose of two-factor authentication (2FA)?
Answer
(B)
To enhance security by requiring multiple authentication methods
2
What are some common symptoms of a computer infected with a virus?
Answer
A
B
C
3
What is the purpose of a keylogger?
Answer
(B)
To record keystrokes
4
Which of the following is a method of protecting against spyware?
Answer
(B)
Installing anti-spyware software.
5
What is the meaning of 'brute force' attack in relation to cyber security?
Answer
(C)
An attempt to try many passwords systematically.
6
Which of the following are recommended steps to protect against malware?
Answer
A
B
C
7
What does the 'http' at the beginning of a web address stand for?
Answer
(B)
Hyper Text Transfer Protocol
8
What is the primary purpose of the HTTPS protocol?
Answer
(B)
To encrypt the data sent between a web browser and a web server
9
What is the term for using social engineering to try to trick someone into divulging sensitive information?
Answer
(A)
Phishing
10
What is the purpose of a web browser?
Answer
(D)
To interpret HTML files and display web pages.
11
What is the purpose of a strong password?
Answer
(C)
To prevent unauthorized access to your accounts.
12
What is a benefit of keeping your software updated?
Answer
(B)
It fixes bugs and security vulnerabilities.
13
What does 'phishing' refer to?
Answer
(C)
Tricking individuals into providing sensitive information.
14
What is a 'botnet' used for?
Answer
(C)
To control a network of infected computers for malicious purposes.
15
What does 'spam' mean in the context of the internet?
Answer
(B)
Unsolicited bulk email.
16
What is the main purpose of a web browser's address bar?
Answer
(B)
To enter a web address to navigate to a specific webpage.
17
What is the general function of a web browser?
Answer
(B)
To access and display information from the internet.
18
Which of the following actions should you take to minimize the risk of a phishing attack?
Answer
(D)
Verify the sender's email address and the content of the email.
19
What is the meaning of a 'digital certificate'?
Answer
(B)
A digital document that is used to verify the identity of a website.
20
What are some of the main features of a web browser?
Answer
(A)
Displaying web pages, storing passwords, allowing to navigate between web pages.
21
What information does a firewall examine?
Answer
(B)
Incoming and outgoing network traffic
22
What is the main goal of cryptography in digital currency?
Answer
(C)
To secure transactions and prevent unauthorized access.
23
What is the meaning of the abbreviation 'URL'?
Answer
(A)
Uniform Resource Locator
24
What is the main purpose of a 'firewall' on a computer?
Answer
(B)
To protect against unauthorized access and malicious software
25
Which parts make up a URL?
Answer
A
B
C
26
What could happen if you visit a website that uses an older version of HTTPS?
Answer
(B)
Reduced security.
27
What is the role of a proxy server?
Answer
(B)
To filter internet traffic
28
What are the functions of cookies?
Answer
A
B
C
29
Which of the following is a potential risk associated with using public Wi-Fi?
Answer
(C)
Data interception by unauthorized users.
30
What is the definition of 'spoofing' in the context of cybersecurity?
Answer
(B)
Disguising an online identity to deceive or gain unauthorized access.
31
What is the main goal of encryption in secure communication?
Answer
(B)
To scramble data to prevent unauthorized access.
32
What is the primary function of encryption in digital currency?
Answer
(C)
Protect transactions and prevent unauthorized access.
33
What does HTTPS stand for and what is its purpose?
Answer
(A)
HyperText Transfer Protocol Secure; It ensures a secure connection.
34
What is a keylogger primarily used for?
Answer
(B)
Recording keystrokes
35
What steps can you take to protect your online accounts?
Answer
A
B
C
36
What is the primary function of a DNS server?
Answer
(A)
To translate domain names into IP addresses.
37
Which is the most secure way to store a password?
Answer
(C)
Using a password manager.
38
What is the main purpose of a Uniform Resource Locator (URL)?
Answer
(B)
To identify and locate resources on the internet.
39
Which of the following is an example of a strong password?
Answer
(D)
P@sswOrd123!
40
What is the purpose of a 'cookie'?
Answer
(C)
To store information about your website activity.
41
Which of the following is an example of social engineering?
Answer
(B)
Clicking on a link in a suspicious email.
42
What is the primary function of two-factor authentication (2FA)?
Answer
(D)
To add an extra layer of security.
43
What is the purpose of a VPN?
Answer
(B)
To encrypt your internet traffic and mask your IP address.
44
What type of security threat involves tricking a user into revealing sensitive information?
Answer
(B)
Phishing
45
What should you do if you suspect your account has been compromised?
Answer
(B)
Change your password immediately and contact the service provider.
46
What is 'phishing'?
Answer
(B)
Tricking people into revealing personal information online.
47
What does 'URL' stand for?
Answer
(C)
Uniform Resource Locator.
48
Which of the following is a good practice when creating a password?
Answer
(C)
Use a password that is at least 12 characters long and includes a mix of character types.
49
What does the acronym DDoS stand for?
Answer
(C)
Distributed Denial of Service
50
What is a common technique used by fraudsters in phishing emails?
Answer
(B)
Creating a sense of urgency to prompt immediate action.