Computer Science for IGCSE & O level - The Internet And Its Uses (Section 8)
1
Which type of malware is designed to block access to a computer system and demands payment for its release?
2
Which of the following are common ways a user can become a victim of a DDoS attack?
3
Which of the following is an example of social engineering?
Answer(B)
An attacker posing as a bank representative to obtain your login credentials.
4
What is the purpose of two-factor authentication?
Answer(B)
To enhance security by requiring two methods of authentication
5
What is multi-factor authentication designed to do?
Answer(B)
Add extra security by requiring multiple verification methods.
6
What does the term "encryption" mean in the context of data security?
Answer(B)
To convert data into a coded format to prevent unauthorized access.
7
What security benefit does HTTPS provide?
Answer(B)
Data encryption between the user's browser and the server.
8
Which action is the best defense against phishing attacks?
Answer(C)
Verifying the sender's email address.
9
Which of the following is designed to monitor all incoming and outgoing network traffic?
10
What is the main purpose of a password manager?
Answer(A)
To generate and securely store strong passwords.
11
What is a potential drawback of using a proxy server?
Answer(B)
Reduced privacy if the proxy server logs user activity.
12
Which of the following is a key indicator that an email might be a phishing attempt?
Answer(D)
The email has poor grammar and spelling.
13
What is one potential risk associated with the use of session cookies?
Answer(B)
If the browser is closed, the session cookie will be lost.
14
What is the purpose of a CAPTCHA?
Answer(A)
To verify that the user is a human.
15
What should you be aware of when reviewing an email to determine if it is a phishing attempt?
16
What does a 'firewall' primarily do?
Answer(B)
Filters incoming and outgoing network traffic.
17
What security measure does HTTPS implement to protect the data during web transactions?
18
In the context of cyber security, what is the main goal of using strong passwords?
Answer(B)
To prevent unauthorized access to online accounts.
19
In a URL, what follows the protocol and domain name to specify the exact web page or resource?
20
Which of the following is a characteristic of a 'firewall'?
Answer(B)
It allows a user to set rules for network traffic.
21
What should you do if you think your online account has been compromised?
Answer(B)
Change your password immediately and contact the service provider.
22
What actions are best for avoiding a phishing scam?
23
Which of the following is a primary function of an SSL certificate?
Answer(B)
To authenticate a website and secure data exchange.
24
Which of the following is/are components of a URL?
25
What is a typical characteristic of a virus?
26
In the context of web security, what does the term 'cookie' refer to?
Answer(B)
A small text file that a website stores on a user's computer to remember information.
27
Which is a characteristic of 'malware'?
Answer(B)
It's designed to harm, steal data, or disrupt computer systems.
28
What is the role of a web server in accessing websites?
Answer(B)
To provide the contents of the website to the user.
29
Which of the following is designed to prevent unauthorized access to a user's account or system?
30
Which of the following is a characteristic of a Trojan Horse?
Answer(B)
It pretends to be something else.
31
Which of the following should you do to protect your accounts online?
32
Which of the following best describes the characteristics of a blockchain?
33
What is a key benefit of using HTTPS?
Answer(B)
Protection of data transmitted over the internet.
34
What is meant by the term 'HTML'?
Answer(A)
Hypertext Markup Language
35
Which of the following is a type of cyber security threat?
36
What type of information is typically stored in a database accessed by a biometric system?
Answer(C)
A template or representation of the user's biometric data.
37
What is a 'phishing' attack designed to do?
Answer(B)
Steal your personal information.
38
What is the main role of a proxy server?
Answer(B)
To act as an intermediary between a user and a web server.
39
What is the purpose of using a firewall as a security measure?
Answer(C)
To prevent unauthorized access to a network.
40
What is the most effective method for preventing malware infections?
Answer(C)
Keeping your software updated.
41
What is the main function of anti-spyware software?
Answer(B)
To detect and remove spyware from a computer.
42
What is a common approach to protect against malware?
Answer(B)
Regularly update your software and operating system.
43
What is the purpose of a 'session caching'?
Answer(B)
To improve the overall performance of the communication.
44
Which of the following is a key characteristic of ransomware?
Answer(B)
It encrypts the victim's data and demands a ransom.
45
What are session cookies?
Answer(B)
Cookies that expire when the browser is closed.
46
Which statements are true about firewalls?
Answer(B)
Firewalls allow a user to set rules for network traffic.
47
What does 'HTTPS' stand for, and what is its primary function?
Answer(B)
Hypertext Transfer Protocol Secure; used for secure communication
48
What is the purpose of the `https://` prefix in a website's URL?
Answer(B)
Indicates a secure connection using SSL/TLS encryption
49
What does two-factor authentication typically involve?
Answer(C)
A password and a code generated by a mobile app or sent via SMS.
50
What does HTTPS stand for?
Answer(A)
HyperText Transfer Protocol Secure