Computer Science for IGCSE & O level - The Internet And Its Uses (Section 3)
1
What is the primary function of a 'web browser'?
Answer(C)
To display web pages and interact with web content.
2
What is the primary goal of a social engineering attack?
Answer(B)
To trick users into revealing confidential information.
3
What is the primary function of a digital certificate used in online security?
Answer(C)
To verify the identity of a website and establish a secure connection.
4
What is the impact of a successful phishing attack?
Answer(B)
Loss of personal information.
5
What is 'social engineering'?
Answer(B)
A technique used by cybercriminals to manipulate people to gain access.
6
Which of the following is NOT a type of malware?
7
What is the primary function of a Uniform Resource Locator (URL)?
Answer(C)
To specify the location of web pages
8
What does the term 'phishing' refer to?
Answer(B)
Attempting to acquire sensitive information by posing as a trustworthy entity.
9
What is the primary goal of a Denial-of-Service (DoS) attack?
Answer(B)
To make a computer or network resource unavailable to its intended users.
10
Which of the following is a characteristic of a 'distributed denial of service' (DDoS) attack?
Answer(B)
It attempts to make a website unavailable by flooding it with traffic from many different computers.
11
What is the main purpose of anti-malware software?
Answer(B)
To protect your computer from viruses and other malware.
12
Which of the following are common signs of a phishing email?
13
What is the purpose of a digital certificate?
Answer(B)
To verify the authenticity of a website and establish a secure connection.
14
What should you do if you have a strong suspicion that your account has been hacked?
Answer(B)
Change your password immediately and enable multi-factor authentication.
15
What is the purpose of a 'public key' in cryptography?
16
What is a key step in protecting yourself against phishing attacks?
Answer(B)
Verifying the sender's email address.
17
What is the primary function of a Trojan horse?
Answer(C)
To disguise itself as legitimate software.
18
Which of the following is a common type of malware?
19
What is the purpose of a 'proxy server'?
Answer(C)
To act as an intermediary between a client and a server.
20
How can you verify the identity of a website that asks you to enter your login credentials?
Answer(B)
Look for the lock icon and 'https' in the URL.
21
What is a 'Trojan horse'?
Answer(C)
Malware disguised as legitimate software.
22
Answer(B)
Software designed to disrupt or damage computer systems.
23
What are some of the techniques that attackers may utilize to trick you?
24
What is a key characteristic of blockchain technology?
Answer(C)
Transparency of transactions.
25
What is the most effective way to protect your system from viruses?
26
What does a browser cache store?
27
What are some effective practices for avoiding phishing scams?
28
What are some of the benefits of using a password manager?
29
What are the essential components of a strong security posture?
30
Which of the following is NOT a common type of biometric identification?
31
What is the main difference between the Internet and the World Wide Web?
Answer(C)
The Internet is the underlying infrastructure, while the World Wide Web is a collection of interconnected web pages.
32
What is the role of the domain name in a URL?
Answer(B)
To identify the server hosting the website.
33
What is the primary goal of data interception, as described in the text?
Answer(B)
To obtain confidential information.
34
What does 'HTTPS' ensure when you are browsing a website?
Answer(C)
A secure connection between your browser and the website.
35
What is the main difference between a web browser and a web server?
Answer(A)
A web browser displays web pages, while a web server stores and delivers them.
36
What are common indications that an email might be a phishing attempt?
37
What is 'spoofing' in the context of cybersecurity?
Answer(B)
The act of pretending to be someone or something else to deceive.
38
What is a benefit of using a Virtual Private Network (VPN)?
39
Which of the following best describes the purpose of a URL?
Answer(B)
To locate and retrieve web pages.
40
What is a key element of a strong password?
Answer(B)
Being long and complex with a mix of characters.
41
Which of the following is designed to prevent third-party eavesdropping on the internet?
42
In the context of digital currency, what does 'Fiat' mean?
Answer(C)
Government-issued currency
43
What does a URL contain that specifies the location of a resource?
44
Which of the following is a characteristic of 'Adware'?
Answer(B)
It displays unwanted advertisements.
45
What is the potential danger of clicking a suspicious link in an email?
Answer(B)
It can lead to a virus infection.
46
What is the primary defense against a DoS attack?
Answer(B)
Increasing the server's bandwidth capacity.
47
What is the primary function of a DNS server?
Answer(C)
To translate domain names into IP addresses.
48
Which of the following is a characteristic of 'persistent cookies'?
Answer(C)
They are stored on the user's computer for a specific time period.
49
What is the main difference between a virus and a worm?
Answer(A)
Viruses need a host program, worms don't.
50
What is the primary purpose of a firewall?
Answer(B)
To block unwanted network traffic