Computer Science for IGCSE & O level - The Internet And Its Uses (Section 17)
1
What is the role of an ethical hacker?
Answer
(B)
To find vulnerabilities with authorization
2
What is the potential risk associated with a user clicking on a malicious link in a phishing email?
Answer
(C)
The user's personal information may be stolen.
3
What are common ways cybercriminals try to gain access to your accounts?
Answer
A
B
C
4
What does a 'VPN' do?
Answer
(B)
Creates a secure and private connection over a public network.
5
What should you do if you believe your online account has been hacked?
Answer
(B)
Contact customer support and change your password.
6
What does URL stand for?
Answer
(B)
Uniform Resource Locator
7
Which of the following can help protect you from pharming attacks?
Answer
(C)
Checking the website's URL and security certificate
8
What is the role of a search engine in relation to the World Wide Web?
Answer
(B)
To organize and index web pages for easy searching.
9
Which of the following methods can be used to mitigate the risk of phishing attacks?
Answer
(C)
Verifying the sender's email address
10
Which type of attack uses deceptive techniques to get users to reveal sensitive information like passwords?
Answer
(C)
Phishing
11
What are the benefits of using a VPN?
Answer
A
B
12
What is the best way to prevent ransomware attacks?
Answer
(B)
Using strong, unique passwords and making regular backups.
13
What should you do if you suspect you've received a phishing email?
Answer
(D)
Report it and delete the email
14
What is a key difference between a firewall and anti-virus software?
Answer
(A)
Firewalls prevent unauthorized access, while anti-virus protects against malicious software.
15
What is the difference between a session cookie and a persistent cookie?
Answer
(A)
Session cookies expire when the browser is closed, persistent cookies do not.
16
What happens when a web browser receives a cookie?
Answer
(B)
The browser stores the cookie information.
17
Which of the following is a potential consequence of a successful phishing attack?
Answer
A
B
C
18
What is the purpose of a digital signature?
Answer
(B)
To verify the authenticity of a message
19
Which of the following is the best definition of 'phishing'?
Answer
(B)
An attempt to steal sensitive information using deceptive emails or websites.
20
What is the main aim of a phishing attack?
Answer
(A)
To steal user credentials
21
What is the function of a Domain Name System (DNS)?
Answer
(B)
To translate domain names into IP addresses.
22
What is the primary purpose of the 'https' protocol?
Answer
(B)
To provide a more secure connection.
23
What is one of the core benefits of using blockchain technology?
Answer
(C)
Enhanced data security.
24
What is the main goal of a keylogger?
Answer
(B)
To record a user's keystrokes.
25
What is the benefit of using two-factor authentication (2FA)?
Answer
(C)
It provides an extra layer of security beyond a password.
26
Which of the following is a characteristic of a strong password?
Answer
(C)
Using a mix of upper and lowercase letters, numbers, and symbols.
27
What kind of attack attempts to make a network resource unavailable to its users?
Answer
(B)
DDoS
28
What can you do to improve the security of your home Wi-Fi network?
Answer
(C)
Change the default network name and use a strong password.
29
Which of these are elements of a strong password?
Answer
A
B
D
30
What is the term for a software or hardware device that sits between a computer and an external network, and filters all incoming and outgoing traffic?
Answer
(B)
A firewall
31
What is the best way to prevent ransomware?
Answer
(D)
All of the above
32
What is 'malware'?
Answer
(D)
Malicious software designed to harm computer systems.
33
What is 'malware'?
Answer
(C)
Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
34
How does encryption contribute to digital currency security?
Answer
(C)
By making transactions secure and preventing unauthorized access
35
What is the main goal of a distributed denial-of-service (DDoS) attack?
Answer
(C)
To make a website or service unavailable by flooding it with traffic.
36
In the context of online security, what is the purpose of two-step verification?
Answer
(B)
To provide a secondary method to verify the user's identity
37
What is the purpose of multi-factor authentication?
Answer
(C)
To require two or more methods of verification.
38
In digital currency, what is 'blockchain' primarily used for?
Answer
(B)
To record and verify transactions in a secure and transparent manner.
39
What is the purpose of a 'firewall'?
Answer
(B)
To protect a computer network from unauthorized access.
40
Which of the following is a potential risk when using a public computer?
Answer
(A)
Personal information can be stolen if you don't log out or clear your browsing history.
41
What is the primary purpose of multi-factor authentication?
Answer
(C)
To add an extra layer of security to accounts.
42
What should a user check when they suspect a phishing email?
Answer
A
B
C
43
What is a potential risk of downloading files from untrusted websites?
Answer
(B)
Exposure to malware.
44
What is the function of a search engine?
Answer
(B)
To index and organize web pages to help users find information.
45
What is the function of a digital signature in a digital transaction?
Answer
(B)
To verify the authenticity and integrity of the transaction.
46
What is the term for a type of malware designed to look like a legitimate program but actually performs malicious activities?
Answer
(B)
A Trojan horse.
47
What technique is used to obtain confidential information by tricking someone into revealing it?
Answer
(C)
Social engineering
48
What is a key benefit of using a password manager?
Answer
(D)
All of the above.
49
What are some of the best practices for online security?
Answer
A
B
C
50
What is the primary role of a firewall in cyber security?