Computer Science for IGCSE & O level - The Internet And Its Uses (Section 9)

1
What is the primary goal of anti-spyware software?
Answer
(B)
To detect and remove spyware from a computer.
2
What is the purpose of 'encryption'?
Answer
(B)
To convert readable data into an unreadable format to protect confidentiality.
3
Which actions can you take to protect yourself from phishing scams?
Answer
A
B
C
4
In the context of email security, what is the definition of a "spam" email?
Answer
(B)
An unsolicited email, often of a commercial nature, sent to a large number of recipients.
5
Which of these practices help to protect against phishing attacks?
Answer
A
B
D
6
What is the primary function of a digital signature?
Answer
(B)
To verify the authenticity and integrity of a digital document.
7
What kind of attack uses deception to get sensitive information?
Answer
(C)
Phishing attack
8
What is a key benefit of using multi-factor authentication?
Answer
(B)
It provides an extra layer of security even if one authentication factor is compromised.
9
What is the function of the browser's cache?
Answer
(A)
To store temporary files and speed up website loading.
10
Which of the following is NOT one of the ways that data can be intercepted leading to cyber security threats?
Answer
(D)
Data encryption
11
What is the duration of 'session cookies'?
Answer
(B)
They expire when the browser is closed.
12
Which of the following best describes 'pharming'?
Answer
(B)
Redirecting a user to a fake website to steal their personal information.
13
What type of information is most at risk in a phishing attack?
Answer
(B)
Login credentials.
14
What is the purpose of a web browser's cache?
Answer
(C)
To speed up website loading times.
15
What is the main function of a firewall?
Answer
(C)
To filter network traffic.
16
What type of digital asset uses cryptography for security?
Answer
(C)
Cryptocurrency
17
What does the acronym 'URL' stand for?
Answer
(A)
Uniform Resource Locator
18
What does a web browser use to translate HTML code?
Answer
(B)
An interpreter
19
Which of the following is a common symptom of a virus infection?
Answer
(B)
Programs crashing.
20
What is the primary purpose of the Domain Name System (DNS)?
Answer
(B)
To translate domain names into IP addresses.
21
What is the role of a Certificate Authority (CA) in SSL/TLS?
Answer
(B)
To issue and validate SSL/TLS certificates.
22
What is the purpose of a 'phishing' attack?
Answer
(B)
To trick people into revealing their personal information.
23
What is the function of a DNS server?
Answer
(A)
To translate domain names into IP addresses.
24
How can you help protect yourself from malware?
Answer
A
B
C
25
What is the purpose of a 'digital certificate'?
Answer
(B)
To verify the identity of a website or server.
26
What is a distributed denial-of-service (DDoS) attack designed to do?
Answer
(B)
Make a website unavailable.
27
Which of the following would be used to help prevent unauthorized access to data?
Answer
A
B
C
28
What security measures can help you protect your online accounts?
Answer
A
B
C
29
What is the main goal of an attacker using a keylogger?
Answer
(B)
To record a user's login information.
30
What is the purpose of using a password manager?
Answer
(B)
To store your passwords securely and generate strong ones.
31
Which of the following are common types of malware?
Answer
A
B
C
32
Which of the following are true about the World Wide Web?
Answer
A
B
D
33
What is the purpose of a VPN?
Answer
(A)
To encrypt your Internet traffic and mask your IP address.
34
What actions can increase security when browsing the web?
Answer
A
B
C
35
Which of the following is a potential consequence of a successful phishing attack?
Answer
(B)
Identity theft.
36
What is the biggest risk of using public Wi-Fi without a VPN?
Answer
(B)
Data can be intercepted by others on the network.
37
What is the main aim of a DDoS attack?
Answer
(B)
To disrupt a website's services by overloading it with traffic.
38
What is the role of a VPN in online security?
Answer
(C)
To encrypt your internet traffic and hide your IP address.
39
If you suspect you've received a phishing email, what is the first thing you should do?
Answer
(D)
Carefully check the email's sender and the content.
40
Which security protocol encrypts the data transfer to and from a website?
Answer
(C)
HTTPS
41
Which is the primary language used to create web pages?
Answer
(C)
HTML
42
What is a key benefit of using two-factor authentication?
Answer
(B)
It provides an extra layer of security by requiring a second verification method.
43
What is a 'zero-day' vulnerability?
Answer
(C)
A vulnerability unknown to the software vendor.
44
In the context of online security, what does the term "spoofing" refer to?
Answer
(B)
The creation of a fake identity or the impersonation of a legitimate entity.
45
When using a website, what does the lock icon in the address bar signify?
Answer
(C)
That the connection to the website is encrypted and secure.
46
What is a 'brute force attack' an attempt to do?
Answer
(B)
Gain access to a system by trying numerous passwords.
47
What is the purpose of a 'backdoor' in a computer system?
Answer
(B)
To provide an alternative way to access the system.
48
Which of the following are potential consequences of a cyberattack?
Answer
A
B
C
49
What does the acronym 'SSL/TLS' stand for?
Answer
(A)
Secure Sockets Layer / Transport Layer Security
50
What is the primary goal of a phishing attack?
Answer
(B)
To steal a user's personal information.