No student devices needed. Know more
35 questions
a set of rules that must be obeyed when transferring files across the internet
In the following option, what are some of the features that most web browsers have?
they have a home page
they have the ability to allow the user to navigate forwards and backwards through websites/web pages already opened
they make use of cookies
data is stored as a cache
make use of JavaScript
Which of these statements accurately shows how a web page can be located and then sent back to the user’s computer?
1. The DNS server (1) finds the URL and map it to an IP address; the IP address is sent to the DNS server (2) which now puts this IP address and associated URL into its cache/database.
2. The corresponding IP address is then sent back to the user’s computer
3. The computer now sets up communication with the website server and the required pages are downloaded. HTML files are sent from the website server to the computer. The browser interprets the HTML, which is used to structure content, and then displays the information on the user’s computer.
4. The user again opens their browser and types in the URL and the browser asks the DNS server (1) for the IP address of the website
5. If DNS server can’t find the URL in its database or its cache, so it sends out a request to a DNS server (2). The cycle repeats until an error is detected
1. The user opens their browser and types in the URL and the browser asks the DNS server (1) for the IP address of the website
2. In this case, let’s assume the DNS server can’t find the URL in its database or its cache, so it sends out a request to a DNS server (2).
3. The DNS server (2) finds the URL and can map it to an IP address; the IP address is sent back to the DNS server (1) which now puts this IP address and associated URL into its cache/database.
4. The computer now sets up communication with the website server and the required pages are downloaded. HTML files are sent from the website server to the computer. The browser interprets the HTML, which is used to structure content, and then displays the information on the user’s computer.
5. The corresponding IP address is then sent back to the user’s computer.
1. The DNS server (1) finds the URL and map it to an IP address; the IP address is sent to the DNS server (2) which now puts this IP address and associated URL into its cache/database.
2. The corresponding IP address is then sent back to the user’s computer
3. The computer now sets up communication with the website server and the required pages are downloaded. HTML files are sent from the website server to the computer. The browser interprets the HTML, which is used to structure content, and then displays the information on the user’s computer.
4. The user again opens their browser and types in the URL and the browser asks the DNS server (1) for the IP address of the website
5. If DNS server can’t find the URL in its database or its cache, so it sends out a request to a DNS server (2). The cycle repeats until an error is detected
1. The user opens their browser and types in the URL and the browser asks the DNS server (1) for the IP address of the website
2. In this case, let’s assume the DNS server can’t find the URL in its database or its cache, so it sends out a request to a DNS server (2).
3. The DNS server (2) finds the URL and can map it to an IP address; the IP address is sent back to the DNS server (1) which now puts this IP address and associated URL into its cache/database.
4. The corresponding IP address is then sent back to the user’s computer.
5. The computer now sets up communication with the website server and the required pages are downloaded. HTML files are sent from the website server to the computer. The browser interprets the HTML, which is used to structure content, and then displays the information on the user’s computer.
Select the all accurate types of cookies
session cookie
permanent cookie
persistent cookie
cypher cookie
Digital currency exists purely in a __________ format.
What system does digital currency rely on?
The problem with centralization is maintaining _________
confidentiality
permanence
insurance
security
The website address contains
country code
domain type
domain host
country address code
domain name
What does URL stands for?
Finding IP addresses for a domain name given in a URL is the role of _____ (hint: a system)
What does cryptocurrency use to track transactions?
Blockchain is a ………….database
Which block is known as the ‘genesis’ block? Enter its number only (e.g: Type '1' if it is the 1st, '2' if it is the 2nd, '3' if it is the 3rd, etc.)
True or False? Whenever a new transaction is made, it makes a new copy.
True
False
It depends
What type of 🍪 is stored in the hard drive of the user’s computer?
What type of 🍪is used for keeping users’ items in a virtual shopping basket?
A form of hacking occurs when companies authorise paid hackers to check out their security measures and test how robust their computer systems are to hacking attacks
the act of gaining illegal access to a computer system without the user’s permission that can lead to identity theft or the gaining of personal information
deleting or corrupting files, causing a computer to malfunction are intentions of _______ (hint: a type of malware)
Viruses need a/ an _____ program on the target computer or an operating system that has already been infected, before they can actually run and cause harm
a program which is often disguised as legitimate software but with malicious instructions embedded within it, replaces all or part of the legitimate software with the intent of carrying out some harm to the user’s computer system
Thing(s) to look out for before clicking a link in an email (be careful):
The email (sender)
Tone of the email
Spelling mistakes (domain name especially)
Suspicious link by hovering over the buttons :>
_________ (hint: a type of malware) redirects a user’s browser to a website that contains promotional advertising by search requests, and could appear in the form of pop-ups/ browser’s toolbar.
Which malware "holds the data hostage"?
Which malware restricts access to the computer and encrypts all the data until an amount of money is paid?
Which malware redirects user to fake website to illegally obtain personal information?
wireless data interception can be carried out using ________
wired data interception can be carried out using ______
To safeguard against wardriving, the use of a _________ (WEP) encryption protocol, together with a firewall, is recommended
The attacker may be able to prevent a user from accessing:
their emails
websites/ web pages
confidential files and documents
online service
a technique that hackers systematically try all the different combinations of letters, numbers and other symbols until eventually they find your password
Spreading itself to other computers and corrupting whole networks are intentions of __________ (hint: a type of malware)
Which malware rely on security failures within networks to permit them to spread unhindered?
a malware that gathers information by monitoring a user’s activities carried out on their computer and send the information back to the cybercriminal who originally sent this malware
This occurs when a cybercriminal sends out legitimate-looking emails (may contain links or attachments) to users that, when initiated, take the user to a fake website/ trick the user into responding with personal data
Explore all questions with a free account