Computer Science for IGCSE & O level - The Internet And Its Uses (Section 4)

1
Which of the following security measures help to prevent phishing attacks?
Answer
A
B
C
2
Which stage comes first when a user is authenticating with two-factor authentication?
Answer
(A)
User enters website username and password.
3
What is the function of the browser cache?
Answer
(A)
To store temporary files to speed up loading websites
4
What does DNS stand for?
Answer
(B)
Domain Name System
5
Which type of attack aims to make a service unavailable by overwhelming it with traffic?
Answer
(B)
DoS attack
6
What does the term 'firewall' refer to in computer security?
Answer
(B)
A device that filters network traffic.
7
What is the primary purpose of a password manager?
Answer
(A)
To generate strong passwords and securely store them.
8
What is the role of multi-factor authentication?
Answer
(B)
To verify your identity using multiple factors.
9
What is the main goal of using HTTPS?
Answer
(B)
To provide a secure and encrypted connection between a user's browser and a website.
10
What type of information might be stored within a web browser's cache?
Answer
(D)
All of the above.
11
What is the role of a web server?
Answer
(B)
To store and deliver web pages to users.
12
What potential issue is related to the use of cookies?
Answer
(B)
They can compromise user privacy by tracking browsing behavior.
13
What does two-factor authentication add to the security of an online account?
Answer
(C)
An additional verification method.
14
Which term is used to describe the act of tricking someone into revealing sensitive information online?
Answer
(A)
Phishing
15
How does blockchain technology primarily work?
Answer
(B)
Decentralized, distributed ledger.
16
What term is used to describe unsolicited bulk email?
Answer
(B)
Spam
17
What is a 'zero-day exploit'?
Answer
(C)
An exploit that exploits an unknown vulnerability.
18
What is the primary function of a firewall?
Answer
(A)
To filter network traffic.
19
What is the purpose of a subdomain in a URL?
Answer
(B)
To identify a separate section or service within a domain.
20
Which of the following are characteristics of a phishing attack?
Answer
(A)
Sending legitimate-looking emails designed to trick the recipients.
21
What is the primary purpose of an antivirus program?
Answer
(B)
To prevent and remove malware from a computer system
22
Which of the following is NOT a method used for user authentication?
Answer
(C)
Firewall
23
What is the term for a method of attacking a system by exploiting known vulnerabilities?
Answer
(B)
Exploitation
24
What is a potential consequence of installing spyware?
Answer
(B)
Identity theft.
25
What measures can you take to protect yourself from identity theft?
Answer
A
B
C
26
What is a common method of spreading a computer worm?
Answer
(B)
By exploiting network vulnerabilities.
27
What is the main difference between a 'session cookie' and a 'persistent cookie'?
Answer
(B)
Session cookies expire when the browser is closed; persistent cookies have an expiration date.
28
What type of attack attempts to flood a server with traffic to make it unavailable?
Answer
(B)
DDoS
29
What is the main advantage of using biometrics for security?
Answer
(B)
Biometric data is hard to replicate or steal.
30
What is the risk associated with using public Wi-Fi networks without proper security?
Answer
(B)
Exposure to eavesdropping and data theft.
31
What is the main function of a firewall regarding incoming traffic?
Answer
(B)
To filter traffic based on criteria
32
What is the main purpose of a web browser's 'back' button?
Answer
(B)
To return to the previous web page visited.
33
What security measures can be used to help prevent cyber security threats?
Answer
A
B
C
34
Which of these actions can help protect against phishing attacks?
Answer
A
B
D
35
What is the purpose of multi-factor authentication?
Answer
(B)
To provide an extra layer of security.
36
What should you do if you suspect your online account has been hacked?
Answer
(C)
Change your password immediately.
37
What is the meaning of the acronym 'URL'?
Answer
(B)
Universal Resource Locator
38
What is blockchain primarily used for in the context of cryptocurrencies?
Answer
(A)
Securing and verifying transactions.
39
What is the primary purpose of using a strong password?
Answer
(B)
To protect your accounts from unauthorized access.
40
How do hackers often attempt a brute-force attack?
Answer
(B)
By trying different combinations of usernames and passwords.
41
What should you consider when creating a strong password?
Answer
(C)
It should use a variety of characters, including uppercase and lowercase letters, numbers, and symbols.
42
What is the purpose of an intrusion prevention system (IPS)?
Answer
(B)
To detect and automatically block malicious network activity.
43
Which security measure is most effective in preventing unauthorized access to a Wi-Fi network?
Answer
(C)
Using a strong password and encryption.
44
What is 'spear phishing'?
Answer
(B)
Phishing that targets specific individuals or groups.
45
What is the primary purpose of a proxy server?
Answer
(B)
To act as an intermediary between your computer and the internet.
46
What types of data is most at risk from spyware?
Answer
A
B
C
D
47
What is a 'brute force attack'?
Answer
(B)
An attack that tries to access a system by using random combinations of usernames and passwords.
48
What does the term 'cache' refer to in the context of a web browser?
Answer
(B)
A storage area for temporary files.
49
Which of the following techniques can help you identify a phishing attempt?
Answer
A
B
C
50
What are some of the ways you can protect yourself from phishing attacks?
Answer
A
B
D