Computer Science for IGCSE & O level - The Internet And Its Uses (Section 20)

1
Why is it important to keep your operating system up to date?
Answer
(C)
To fix security vulnerabilities and improve performance.
2
What should you do with any emails that come from an unknown sender?
Answer
(C)
Delete or mark them as spam.
3
What are some common indicators that a computer may be infected with a virus?
Answer
A
B
C
D
4
Which of the following is an example of a strong password?
Answer
(C)
P@sswOrd2024!
5
What is a botnet?
Answer
(B)
A network of infected computers controlled by a single attacker.
6
What is a 'botnet' used for?
Answer
(B)
To control a network of infected computers for malicious purposes.
7
What is 'social engineering'?
Answer
(C)
Manipulating people into divulging confidential information.
8
What is the primary function of a web browser's 'private browsing' mode?
Answer
(B)
To prevent your browsing history and cookies from being saved.
9
What is the best way to secure your online accounts?
Answer
(C)
Using a strong, unique password for each account.
10
What does the term 'pharming' refer to?
Answer
(B)
Redirecting users to fake websites
11
What is the main goal of using a blockchain network?
Answer
(B)
Decentralized data
12
What is the function of session caching in TLS?
Answer
(A)
To improve the overall performance of the communication
13
Which of the following is an example of a biometric authentication method?
Answer
(C)
Fingerprint recognition
14
Which of the following is a characteristic of a persistent cookie?
Answer
(B)
It is stored on the user's hard drive.
15
What is the function of the 'back' button in a web browser?
Answer
(C)
To return to the previous webpage you visited.
16
Which technology is used to encrypt data transmitted over the internet?
Answer
(C)
Encryption
17
What does the term 'pharming' refer to?
Answer
(B)
Redirecting users to fake websites.
18
What is the purpose of a 'home page' in a web browser?
Answer
(C)
To provide a starting point or initial page when the browser is opened.
19
What type of file is typically accessed via a web browser?
Answer
(D)
All of the above
20
What is the function of anti-virus software?
Answer
(B)
To prevent the spread of malware.
21
Which methods are often used by cybercriminals in social engineering attacks?
Answer
A
B
C
22
What are the two main types of cookies?
Answer
(B)
Session and persistent
23
What is a 'worm' in the context of cybersecurity?
Answer
(B)
A program that self-replicates and spreads across a network.
24
What term describes the act of gaining illegal access to a computer system?
Answer
(B)
Hacking
25
What is the main aim of ransomware?
Answer
(B)
To encrypt files and demand a ransom.
26
What is a 'brute-force attack'?
Answer
(B)
An attempt to guess a password by trying many combinations.
27
What is a characteristic of a Trojan horse?
Answer
(C)
It is disguised as legitimate software.
28
Which of the following best describes the main purpose of a firewall?
Answer
(A)
To monitor and filter network traffic.
29
Which of the following is an example of a biometric security method?
Answer
(B)
Fingerprint scan
30
Which of the following is an example of a social engineering attack?
Answer
(C)
A phishing email.
31
What is the basic requirement for digital currencies?
Answer
(C)
The encryption and security
32
What is the primary purpose of a one-time password (OTP)?
Answer
(B)
To provide an additional layer of security for authentication.
33
What is 'phishing'?
Answer
(C)
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
34
What should you do if you receive an email from your bank asking you to confirm your account details?
Answer
(C)
Check the sender's email address and the email's content for any red flags.
35
What is 'Social Engineering' in the context of cyber security?
Answer
(C)
Manipulating individuals to reveal confidential information.
36
What does the lock icon in a web browser's address bar indicate?
Answer
(B)
That the website is using a secure connection.
37
What is the purpose of the 'bookmark' or 'favorites' feature in a web browser?
Answer
(C)
To save and quickly access frequently visited websites.
38
Which element of a URL identifies the specific resource, like a webpage, within a website?
Answer
(C)
The path.
39
What is a Trojan horse?
Answer
(B)
A malicious program disguised as legitimate software