Computer Science for IGCSE & O level - The Internet And Its Uses (Section 19)
1
Which of the following is a key characteristic of the internet?
2
What is the basic principle behind blockchain technology?
Answer(C)
Decentralized and tamper-proof data storage
3
What does 'spam' refer to?
Answer(B)
Unwanted or unsolicited electronic messages.
4
Which of the following is a key indicator of a phishing attempt?
Answer(B)
A request for personal information.
5
What type of attack is designed to steal sensitive information by disguising itself as a trustworthy entity?
6
What are some of the risks of poor cyber security?
7
What is 'shoulder surfing'?
Answer(A)
Looking over someone's shoulder to see their screen.
8
What is 'wardriving' used for?
Answer(C)
To identify vulnerable wireless networks.
9
Which of the following is NOT a type of malware?
10
What is 'social engineering' in the context of cybersecurity?
Answer(C)
Manipulating people into divulging confidential information.
11
What is the primary goal of identity theft?
Answer(B)
To obtain a person's personal information for financial gain.
12
What is the primary goal of identity theft?
Answer(A)
To steal someone's personal information for malicious purposes.
13
What are some of the common ways of cyber security attacks?
14
What are some of the benefits of blockchain technology?
15
What is the purpose of a 'digital footprint'?
Answer(B)
To identify your online activity and presence.
16
What is the primary function of a domain name server (DNS)?
Answer(B)
To translate domain names into IP addresses.
17
What security measure does HTTPS provide that HTTP does not?
Answer(B)
Encryption of data transmitted between the browser and the server.
18
Which of the following actions helps to protect your online accounts?
Answer(C)
Enabling two-factor authentication.
19
What is a common characteristic of a strong password?
Answer(C)
Including a mix of uppercase and lowercase letters, numbers, and symbols.
20
What are some red flags to look out for in a phishing email?
21
What is the role of a 'key' in encryption?
Answer(C)
To encrypt and decrypt data.
22
What is a key advantage of using two-factor authentication (2FA)?
Answer(B)
It provides an additional layer of security beyond a password.
23
What is the purpose of 'private browsing' mode?
Answer(B)
To prevent your browsing history and cookies from being saved.
24
What is the primary function of DNS (Domain Name System)?
Answer(B)
To translate domain names into IP addresses.
25
What are some examples of what can be used in authentication?
26
What is the purpose of anti-spyware software?
Answer(B)
To detect and remove spyware
27
What is the role of a DNS server?
Answer(B)
To translate domain names into IP addresses.
28
What is the primary goal of data interception?
Answer(B)
To obtain confidential information
29
Which security threats could you encounter when using a public Wi-Fi network?
30
What is 'shoulder surfing'?
Answer(A)
Looking over someone's shoulder to steal their password.
31
What are some red flags to look out for in emails?
32
What is the purpose of a URL?
Answer(B)
To identify a specific web page.
33
What is a common practice to protect your devices?
Answer(C)
Installing anti-virus software.
34
What are some of the red flags that might indicate a user has been a victim of a phishing attack?
35
Which of these is a good practice for online safety?
Answer(D)
Regularly review your privacy settings.
36
What is the main purpose of anti-spyware software?
Answer(C)
To detect and remove spyware
37
Which of the following are ways a company can prevent unauthorized access to their data?
38
Answer(B)
A security system that monitors and controls network traffic.
39
Which type of malware spreads by attaching itself to other programs?
40
What is the main risk of downloading software from untrusted sources?
41
What is the key function of a web browser?
Answer(C)
To access and display web pages
42
What are the characteristics of a strong password?
43
What is the purpose of a digital signature?
Answer(B)
To verify the authenticity and integrity of a message.
44
Which of the following is NOT a common type of malware?
45
What is a common method of spreading viruses?
Answer(A)
Through email attachments
46
What type of file is used to display content on a webpage?
47
What are some common security threats that businesses might face?
48
What is the main benefit of using a web browser's 'History' feature?
Answer(B)
To keep a record of websites visited for easy retrieval.
49
What are the benefits of using two-factor authentication?
50
What is a potential risk of using public Wi-Fi?
Answer(B)
Your data may be intercepted by others.