Computer Science for IGCSE & O level - The Internet And Its Uses (Section 18)

1
Which of the following is an example of a domain name?
Answer
(B)
www.example.com
2
What is a common method used in phishing attacks?
Answer
(A)
Creating fake websites that look like legitimate ones.
3
What is the general rule about using strong passwords?
Answer
(C)
Use a unique password for each account.
4
What are some ways to protect yourself from cyber security threats?
Answer
A
B
C
5
Which of the following actions can be taken to prevent data interception attacks?
Answer
A
B
C
6
What is the advantage of using a blockchain network?
Answer
(C)
Increased security due to decentralization and cryptography
7
What should you do if you see an unknown program trying to access the internet?
Answer
(B)
Block it unless you know what it is.
8
What is the role of a VPN?
Answer
(C)
To encrypt your internet traffic and mask your IP address.
9
What is a digital footprint?
Answer
(B)
The trail of data you leave online
10
What is the primary aim of a keylogger?
Answer
(B)
To record the user's keystrokes
11
What is the term for a malicious program designed to replicate itself and spread to other computers?
Answer
(B)
A virus
12
What does the term 'phishing' refer to?
Answer
(C)
A fraudulent attempt to obtain sensitive information.
13
What is the primary function of a firewall?
Answer
(B)
To filter network traffic
14
Which type of malware specifically aims to encrypt a user's data and demand a ransom?
Answer
(C)
Ransomware
15
Which of the following is a key characteristic of an SSL certificate?
Answer
(A)
It is used to verify a website's identity.
16
What does 'pharming' involve?
Answer
(B)
Redirecting users to fake websites.
17
What is the definition of 'man-in-the-middle' attack?
Answer
(A)
An attack where a malicious actor intercepts communication between two parties.
18
If you suspect your account has been compromised, which action should you take FIRST?
Answer
(B)
Change your password immediately.
19
What is the main risk associated with opening an email attachment from an unknown sender?
Answer
(B)
Potential malware infection
20
Which of the following is a type of malware that spreads via email attachments?
Answer
(B)
Virus
21
What are the key components of a URL?
Answer
A
B
C
D
22
What is a significant difference between a virus and a worm?
Answer
(A)
A virus requires a host file, while a worm is self-contained.
23
What security measure is best to combat phishing attacks?
Answer
(C)
Being aware of phishing attempts and verifying sender information
24
What is the primary goal of a 'phishing' attack?
Answer
(B)
To trick users into revealing sensitive information.
25
What can you do to protect your personal information when using public Wi-Fi?
Answer
(B)
Use a VPN.
26
What is the main purpose of anti-virus software?
Answer
(B)
To protect your computer from malware.
27
What are some common threats to Cyber Security?
Answer
A
B
C
28
What does 'malware' stand for?
Answer
(D)
Malicious Software
29
What does the term 'ethical hacking' primarily involve?
Answer
(C)
Identifying security vulnerabilities with permission
30
What is the main function of anti-virus software?
Answer
(C)
To detect and remove malicious software
31
What is the function of JavaScript in a web browser?
Answer
(B)
To add interactivity and dynamic behavior to a web page.
32
What is a potential consequence of using an outdated web browser?
Answer
(B)
Enhanced security vulnerabilities.
33
What is the purpose of a web browser's 'History' feature?
Answer
(B)
To keep a record of the websites you've visited.
34
What is a benefit of using a VPN?
Answer
(B)
It makes your internet browsing more private.
35
What is a 'brute force' attack in the context of cyber security?
Answer
(C)
An attack that attempts to guess passwords by systematically trying different combinations.
36
What is the main goal of Blockchain technology?
Answer
(C)
Enhanced data transparency and security
37
What is the main goal when using cryptography?
Answer
(C)
Secure communication and data storage
38
Which of the following is a potential consequence of using a weak password?
Answer
(C)
Account compromise.
39
What is the best practice for creating strong passwords?
Answer
(C)
Including a mix of uppercase and lowercase letters, numbers, and symbols.
40
What does digital currency use to ensure its safety?
Answer
(B)
Encryption
41
What is an IP address used for?
Answer
(B)
To uniquely identify devices on a network.
42
What is the term for a website designed to look like a legitimate one in order to steal a user's credentials?
Answer
(C)
A phishing site.
43
Which are the common Cyber Security Threats?
Answer
A
B
C
44
What is the primary function of anti-virus software?
Answer
(B)
To protect your computer from malware.
45
Which of the following helps to prevent unauthorized access to your computer?
Answer
(A)
Using a strong password.
46
Which of the following is a potential security risk when using public Wi-Fi?
Answer
(C)
Your data can be intercepted.
47
Which of the following is a method of authentication?
Answer
(C)
Two-factor authentication.
48
What is a key indicator of a phishing attempt?
Answer
(B)
Requests for personal information
49
Which type of malware replicates itself and spreads across a network?
Answer
(B)
Worm
50
Which security practice is recommended when using public computers?
Answer
(C)
Clear the browsing history and cache after use.