What does URL stand for?
Uniform Resource Locator
This type of attack guesses every possible password combination until it finds the correct one.
Bruto force attack
This malware attaches itself to a file or program and spreads only when that file is run.
Virus
What does HTTP stand for?
Hypertext Transfer Protocol.
Where are session cookies stored?
Temporary memory (RAM)
Explain the main aim of a DDoS attack.
to make a website or service unavailable by overwhelming it with traffic
Compare phishing and pharming in terms of how each tricks the user.
Phishing uses fake messages or links to lure users; pharming redirects them automatically even when they type the correct address.
Name two features of a web browser.
(Any two) Bookmarks/favourites, history, tabs, cookies, navigation tools, address bar.
Why does a persistent cookie remain after the browser is closed?
Because it is stored on the hard drive/SSD until expiry or deletion.
Explain the role of firewall.
This type of software helps block unauthorized access by filtering incoming and outgoing network traffic.
Why is regularly updating software and operating systems important for preventing malware infections?
Because updates patch security vulnerabilities that malware might exploit.
Explain the difference between session cookies and persistent cookies, with one example of each.
Session cookies = temporary (e.g., shopping cart during browsing). Persistent cookies = long-term (e.g., saved login details).
Compare the role of the browser in displaying HTML with the role of the DNS server in locating the web page.
Browser = interprets HTML for display. DNS = resolves domain name to IP so browser can find server.
Why might relying only on anti-virus software be insufficient to prevent malware infections in an organization?
Because anti-virus reacts after infection; organizations also need firewalls, regular updates, and user awareness to prevent attacks in the first place.
A hospital’s systems are hit with ransomware. Besides paying the ransom, what prevention measures should have been in place?
Regular backups, patched systems, and employee awareness training to avoid malware infections.
What are the main components of a URL?
Give four.
protocol, domain host, domain name, domain type, country code, path/file name
Explain how data encryption in HTTPS prevents a “man-in-the-middle attack.”
Encryption scrambles data with a key, preventing attackers from reading/intercepting during transmission.
State two functions of a proxy server.
This network tool can cache web pages to improve speed and provide anonymity by hiding a user’s IP address
BONUS
BONUS
How does the SSL protocol create a secure connection?
The web server sends its SSL certificate to the browser.
The browser checks the certificate is valid and trusted.
Both sides then exchange encryption keys.
From then on, all data is sent in encrypted form, creating a secure connection.
Describe the process that takes place when a user enters a URL into a web browser to retrieve and display a web page.
The web browser sends a request to a DNS server to resolve the domain name.
The DNS server returns the corresponding IP address of the web server.
The browser uses this IP address to send a request to the web server.
The web server locates the requested files (usually HTML and related files such as CSS, images, JavaScript).
The web server sends the files back to the browser.
The browser interprets the HTML and displays the web page to the user.