Computer Science for IGCSE & O level - The Internet And Its Uses (Section 6)
1
Which of the following is a common method used to carry out data interception on Wi-Fi networks?
2
Which of the following is the most common threat a user encounters while browsing the internet?
3
Which of the following is/are true about session cookies?
4
What are some common ways to protect yourself from malware?
5
What are the common features of a strong password?
6
Which of the following should you do to protect yourself against phishing attacks?
7
What is the purpose of a 'spoofing' attack?
Answer(C)
To impersonate a legitimate entity.
8
What is a common purpose of a keylogger?
Answer(B)
To record a user's keystrokes.
9
What type of network device usually sits behind a firewall?
10
What is a primary risk associated with using public Wi-Fi?
Answer(C)
Eavesdropping by malicious actors.
11
Which of the following is a common type of malware?
12
What does the acronym 'DDoS' stand for?
Answer(B)
Distributed Denial of Service
13
What is the purpose of a digital certificate?
Answer(B)
To verify the identity of a website and establish a secure connection.
14
What is the function of a 'domain name server'?
Answer(C)
To translate domain names into IP addresses.
15
In the context of network security, what does the term 'spoofing' refer to?
Answer(D)
The act of impersonating a device or user.
16
What is the primary function of a 'Certificate Authority (CA)'?
Answer(B)
To issue and manage digital certificates.
17
How does a password manager typically enhance your online security?
Answer(A)
By generating and storing strong, unique passwords for your accounts.
18
Which technology allows for the creation and exchange of digital currency?
19
What is the main goal of 'Spyware'?
Answer(B)
To secretly monitor a user's activity.
20
Answer(B)
A form of malware that encrypts data and demands a ransom for its release.
21
Answer(B)
A network of compromised computers controlled remotely.
22
What is the function of a DNS server?
Answer(A)
Converting domain names to IP addresses.
23
In the context of cybersecurity, what does 'authentication' mean?
Answer(B)
Verifying a user's identity.
24
Which of the following is an example of a 'cookie'?
Answer(B)
A small text file stored on a user's computer by a website.
25
What should you do if you lose your phone?
Answer(B)
Immediately contact your mobile carrier and report it lost or stolen.
26
What is the purpose of two-factor authentication?
Answer(B)
To verify a user's identity using two different pieces of evidence.
27
What is the purpose of SSL/TLS (Secure Sockets Layer/Transport Layer Security) in web browsing?
Answer(B)
To ensure secure communication between a user's browser and a web server
28
Which of the following characteristics contribute to a strong password?
29
What task does a DNS server perform?
Answer(B)
Translates domain names into IP addresses.
30
What is the purpose of multi-factor authentication?
Answer(B)
To verify the user's identity with multiple methods
31
What are characteristics of a strong password?
32
What should you do to keep your operating system secure?
33
What happens to a session cookie after the user closes the web browser?
Answer(D)
It is automatically deleted.
34
What is the primary function of a VPN?
Answer(C)
To encrypt your internet traffic and mask your IP address.
35
What does the World Wide Web (WWW) consist of?
Answer(C)
A system of interconnected multimedia pages.
36
What is a 'brute force' attack?
Answer(B)
An attack that attempts to access a system by trying a vast number of passwords.
37
Which of the following is a characteristic of a strong password?
Answer(D)
It includes a mix of upper and lowercase letters, numbers, and symbols.
38
What is the main role of a DNS server?
Answer(B)
To translate domain names into IP addresses.
39
What is the role of an IP address?
Answer(A)
To identify the specific location of a website's content.
40
Which of the following is NOT a method of social engineering?
41
What does the 'handshake protocol' in TLS do?
Answer(C)
It authenticates the server and client and establishes a secure connection.
42
Which of the following is a characteristic of a Distributed Denial of Service (DDoS) attack?
Answer(B)
It uses many compromised computers.
43
What is meant by the term 'HTML'?
Answer(B)
Hypertext Markup Language
44
What does HTTPS use to secure data transmission?
45
Which of the following are essential for strong password construction?
46
What is the primary risk associated with connecting to an unsecured Wi-Fi network?
Answer(B)
Risk of data interception.
47
Which of the following is a recommended practice for password management?
Answer(C)
Creating unique, strong passwords for each account.
48
What is the best way to protect your computer from malware?
Answer(B)
Regularly update your operating system and software.
49
What is the best way to avoid a malware infection?
Answer(C)
Keeping your software up to date.
50
What type of program can be used to intercept and monitor data transmitted over a network?