Computer Science for IGCSE & O level - The Internet And Its Uses (Section 7)

1
What are some common signs of a phishing attempt?
Answer
A
B
C
2
Which of the following are potential uses for an SSL certificate?
Answer
A
B
3
What does the abbreviation 'DoS' stand for?
Answer
(C)
Denial of Service
4
What is a 'worm'?
Answer
(B)
A type of malware that can replicate itself and spread without user interaction.
5
What is the main goal of ransomware?
Answer
(B)
To encrypt your data and demand a ransom payment for its release.
6
What is the main risk associated with phishing?
Answer
(B)
Theft of personal information.
7
What is a 'honeypot' used for in cybersecurity?
Answer
(A)
To identify and capture hackers.
8
What is the primary role of the 'Domain Name System' (DNS)?
Answer
(B)
To translate domain names into IP addresses.
9
What does the acronym 'URL' stand for?
Answer
(A)
Uniform Resource Locator
10
Which of the following are advantages of using the internet?
Answer
A
B
C
11
Which of the following is an example of social engineering?
Answer
(B)
Sending a phishing email to trick someone into revealing their password.
12
In a URL, the protocol specifies:
Answer
(C)
The type of communication used to access the resource.
13
Which of the following is a common technique used to protect against phishing attacks?
Answer
(B)
Carefully checking the sender's email address and the link's destination
14
Which of the following is a common characteristic of a 'worm'?
Answer
(B)
It spreads automatically without human intervention.
15
What security features does HTTPS provide?
Answer
A
B
16
What information can cookies be used to remember?
Answer
A
B
C
D
17
Which actions can help prevent a 'man-in-the-middle' attack?
Answer
A
B
18
What is the role of encryption in data security?
Answer
(B)
To hide the data from unauthorized users.
19
Which of the following is a type of cyber security threat?
Answer
(C)
A virus.
20
What does HTTPS stand for, and what extra functionality does it add to HTTP?
Answer
(A)
Hypertext Transfer Protocol Secure; adds encryption and authentication.
21
Which of the following is a characteristic of a worm?
Answer
B
C
22
Which of the following is a potential risk associated with the use of biometrics?
Answer
(B)
The potential for biometric data to be compromised or stolen
23
What does the 'S' in HTTPS represent?
Answer
(A)
Secure
24
What are some ways to protect your online accounts?
Answer
A
B
C
25
Which of the following is a characteristic of a blockchain?
Answer
(B)
Transactions cannot be changed without the consent of all network members
26
What is a 'Trojan Horse' in the context of cybersecurity?
Answer
(C)
Malicious software disguised as legitimate software.
27
Which of the following is a potential consequence of successful phishing?
Answer
(B)
Identity theft.
28
What is the primary function of the web browser?
Answer
(B)
To display and interact with web pages.
29
What are some of the methods used by firewalls to secure network traffic?
Answer
A
B
C
30
What measures can help prevent cyber security threats?
Answer
A
B
C
31
What does HTML stand for?
Answer
(A)
Hyper Text Markup Language
32
Which of the following is NOT a characteristic of strong passwords?
Answer
(C)
Use of the user's favorite color
33
What does the acronym 'DNS' stand for?
Answer
(B)
Domain Name System
34
Which technology often utilizes the SSL/TLS protocol for secure communication?
Answer
(D)
All of the above.
35
Which of the following are benefits of using the internet?
Answer
A
B
C
36
In a URL, what does the part after the domain name and before the file name typically represent?
Answer
(B)
The path
37
What is the primary characteristic of a decentralized system like a blockchain?
Answer
(B)
Data is duplicated and distributed across multiple nodes.
38
In the context of computer security, what is meant by 'least privilege'?
Answer
(A)
Giving users access to only the files they need.
39
Which of the following should you look out for when checking the validity of an email?
Answer
A
B
C
D
40
Which of the following is a potential security risk associated with using public Wi-Fi?
Answer
(C)
The potential for attackers to intercept your data.
41
What is the main goal of social engineering in the context of cyber security?
Answer
(B)
To manipulate individuals into revealing sensitive information.
42
What is a 'backdoor' in the context of computer security?
Answer
(B)
A secret entry point to a system that bypasses normal security.
43
Which security threat involves intercepting data packets as they travel over a network?
Answer
(B)
Packet sniffing
44
Which of the following actions should you take if you suspect you've been phished?
Answer
(C)
Change your passwords immediately.
45
Which of the following is NOT a common type of malware?
Answer
(C)
Firewall
46
What is a key advantage of using strong passwords?
Answer
(C)
They make it more difficult for unauthorized users to access your accounts.
47
What does a Uniform Resource Locator (URL) define?
Answer
(B)
The specific location of a resource on the web.
48
What is the best way to protect your online accounts?
Answer
(C)
Using unique, strong passwords and enabling multi-factor authentication.
49
What is a common tactic used in phishing attacks?
Answer
(D)
All of the above.
50
What type of attack attempts to flood a server with traffic to make a website unavailable?
Answer
(C)
DDoS