Computer Science for IGCSE & O level - The Internet And Its Uses (Section 2)
1
What does 'phishing' involve?
Answer
(B)
Trying to trick people into giving away their personal information online.
2
In the context of cyber security, what does the term 'malware' stand for?
Answer
(A)
Malicious software
3
What type of malware is designed to steal sensitive information such as login credentials and financial data?
Answer
(C)
Spyware
4
What are some best practices to protect against a phishing attack?
Answer
A
B
C
5
What is a common method hackers use in a brute-force attack?
Answer
(A)
Trying every possible password combination.
6
What do we call the process that converts a human-readable domain name (e.g., www.example.com) into an IP address?
Answer
(C)
DNS lookup
7
What is the role of a digital certificate in HTTPS?
Answer
(B)
To authenticate the server's identity.
8
Which of the following is a security risk associated with using public Wi-Fi?
Answer
(B)
Easier for attackers to intercept your data.
9
What does the term 'malware' stand for?
Answer
(A)
Malicious Software
10
What is the primary method used in phishing attacks?
Answer
(A)
Sending unsolicited emails.
11
What is the purpose of 'spam' emails?
Answer
(B)
To send unsolicited bulk messages.
12
What are the common ways in which attackers can gain access to your accounts?
Answer
A
B
C
13
Which of the following is a characteristic of a strong password?
Answer
(C)
It contains a mix of uppercase and lowercase letters, numbers, and symbols.
14
What is the purpose of a 'path' in a URL?
Answer
(C)
To locate the specific resource (e.g., a file or a page) on a server.
15
What type of attack is described as attempting to overwhelm a server with numerous requests?
Answer
(B)
DoS attack.
16
What is the purpose of a firewall?
Answer
(B)
To filter and control network traffic.
17
What is the purpose of the "blacklist" in the context of internet security?
Answer
(B)
To block known malicious websites and IP addresses.
18
In the context of social media security, what does 'public access' refer to?
Answer
(C)
Data accessible to anyone on the internet.
19
What is the characteristic of a blockchain that ensures data integrity?
Answer
(B)
Immutability of the data.
20
Which type of malware encrypts a user's files and demands payment for the decryption key?
Answer
(C)
Ransomware
21
Which actions help to protect against 'man-in-the-middle' attacks?
Answer
A
B
D
22
What does 'malware' do?
Answer
(C)
It can cause harm to the computer's data or operations.
23
What is the purpose of 'two-factor authentication'?
Answer
(B)
To verify a user's identity using multiple methods.
24
What does the term 'biometrics' refer to in the context of authentication?
Answer
(B)
Unique physical characteristics.
25
Which of the following files does a web browser cache store?
Answer
(B)
Website images and scripts.
26
What is a key feature of blockchain technology?
Answer
(B)
Immutability of the data.
27
What are some common techniques employed in phishing scams?
Answer
A
B
C
D
28
What are some of the major uses of Cookies?
Answer
A
B
C
29
What does the term 'phishing' refer to?
Answer
(C)
The act of fraudulently attempting to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication.
30
What does the term 'phishing' refer to?
Answer
(C)
The practice of obtaining sensitive information through deception.
31
Which security measure helps protect against the theft of your online credentials?
Answer
(A)
Using a strong password.
32
What type of social engineering involves the attacker pretending to be someone in authority to gain information?
Answer
(A)
Pretexting
33
What type of access is granted to 'friends' in the context of social networking settings?
Answer
(D)
Customized access based on the user's preferences.
34
Which of the following is a potential problem associated with an email that appears to be from a company, but is actually a phishing attempt?
Answer
(B)
The email contains a virus that could be used to access data
35
What can you do to protect against a Man-in-the-Middle (MitM) attack?
Answer
A
B
36
Which of the following is an example of multi-factor authentication?
Answer
B
D
37
What is the biggest risk associated with clicking on links in emails from unknown senders?
Answer
(C)
You might be directed to a malicious website.
38
What is a potential risk of clicking on a shortened URL?
Answer
(B)
The destination website is hidden, and it could lead to a malicious site.
39
Which of the following actions might indicate a phishing attempt?
Answer
(B)
Being asked to provide personal information via email.
40
What part of a URL specifies the type of protocol used (e.g., http or https)?
Answer
(C)
Protocol
41
Which of the following is a potential result of a 'DDoS attack'?
Answer
(B)
A website becoming temporarily unavailable.
42
Which of the following is an example of a security protocol?
Answer
(C)
HTTPS
43
What is the purpose of a VPN (Virtual Private Network)?
Answer
(B)
To encrypt your internet traffic and mask your IP address.
44
What is the primary purpose of automatic software updates?
Answer
(B)
To protect against malware and improve software performance
45
Which of the following is an advantage of using a strong password?
Answer
A
C
46
What is the primary purpose of a firewall?
Answer
(A)
To filter unwanted Internet traffic
47
What technology allows users to access websites?
Answer
(B)
The World Wide Web (WWW)
48
What are the characteristics of a strong password?
Answer
B
C
49
What is the primary goal of a 'brute-force' attack?
Answer
(B)
To guess a password by trying multiple combinations.