Computer Science for IGCSE & O level - The Internet And Its Uses (Section 5)
1
Which of the following actions could potentially help protect against unauthorized access to data?
2
What do 'session cookies' do?
Answer(A)
Store information about a user's session.
3
What is the main benefit of using cryptocurrency?
Answer(B)
Increased financial privacy
4
Which of the following is NOT a function of a web browser?
Answer(D)
Providing internet connectivity.
5
What are some of the functions of a web browser?
6
What is 'phishing' designed to achieve?
Answer(B)
To steal sensitive data by posing as a legitimate entity.
7
What is the purpose of a VPN (Virtual Private Network)?
Answer(B)
To encrypt your internet traffic and mask your IP address.
8
What is a 'VPN' (Virtual Private Network) primarily used for?
Answer(B)
To create a secure connection between a user and a network.
9
Which of the following is a key component of 'two-factor authentication'?
10
What is the primary method of spreading a Trojan horse?
Answer(B)
Deceiving users into downloading it.
11
What is a digital signature used for in the context of digital currency or blockchain?
Answer(B)
Authenticating transactions and verifying identity.
12
What is the role of intrusion detection software?
Answer(B)
To detect and log potentially malicious network traffic.
13
What is the function of a web browser?
Answer(B)
To interpret and display HTML content.
14
In the context of email security, what are the risks associated with clicking links in emails?
Answer(B)
Links can direct you to malicious websites that try to steal your credentials.
15
What is the purpose of the 'path' component in a URL?
Answer(C)
Specifies the location of the resource on the server.
16
What is the most common method used to spread a computer virus?
Answer(C)
Through email attachments or infected files.
17
Which security measure involves using unique physical characteristics for identification?
18
What term describes the process of gaining illegal access to a computer system?
19
Which term describes the technique of using a false identity to gain access to restricted information?
20
What is the role of a DNS server?
Answer(A)
To translate domain names into IP addresses.
21
What is the danger associated with a 'man-in-the-middle' attack?
Answer(B)
An attacker can intercept and potentially alter communications.
22
What is the purpose of two-factor authentication (2FA)?
Answer(B)
To verify your identity using two different methods.
23
What does a browser use to read and translate HTML code?
24
What is the meaning of the acronym 'HTTPS'?
Answer(A)
Hypertext Transfer Protocol Secure
25
What does the abbreviation 'URL' stand for?
26
Which of the following are essential elements in the process of 'authentication'?
27
What are the key components of a two-step verification process?
28
Which term describes the theft of sensitive information, such as usernames, passwords, and credit card details?
29
What is the role of the 'operating system' on a computer?
Answer(B)
To manage the computer's hardware and software resources.
30
Which of the following best describes the term 'spoofing' in the context of cybersecurity?
Answer(B)
The act of disguising an email address to make it seem legitimate.
31
What is the main difference between the Internet and the World Wide Web (WWW)?
Answer(A)
The Internet is a collection of interconnected networks, while the WWW is a method of accessing information over the Internet.
32
What is a keylogger designed to do?
Answer(B)
Record a user's keystrokes.
33
What is the purpose of an SSL certificate?
Answer(B)
To encrypt the communication between your web browser and the web server.
34
Which of the following is/are benefits of using blockchain technology?
35
What is the purpose of a 'VPN' (Virtual Private Network)?
Answer(B)
To create a secure, encrypted connection over a public network.
36
Which of the following are common methods of social engineering?
37
Which type of malware is most likely to be used to steal your credit card information?
38
What are some of the security risks of using public Wi-Fi?
39
What are some of the main advantages of blockchain?
40
Which of the following helps to prevent pharming attacks?
41
What should you do if you receive a suspicious email from your bank asking for personal information?
Answer(C)
Contact your bank directly through their official website or phone number.
42
Which of the following is NOT a common form of cyber security threats?
43
What is the main function of 'antivirus software'?
Answer(B)
To identify, prevent, and remove malicious software.
44
What is a 'botnet' primarily used for?
45
Answer(A)
Finding unsecured Wi-Fi networks while driving.
46
What are the potential risks associated with using public Wi-Fi networks?
47
What is the main goal of 'phishing' attacks?
Answer(B)
To steal your personal information.
48
What is the primary method used in phishing attacks?
49
What is the impact of using a weak password?
Answer(D)
It increases the chance of unauthorized access to your accounts.
50
What is the purpose of a digital certificate?
Answer(B)
To verify the identity of a website.