The internet and the world wide web
Cyber security
Digital currency
Cyber security
The internet and the world wide web
100

What does URL stand for?

Uniform Resource Locator





100

This type of attack guesses every possible password combination until it finds the correct one.

Bruto force attack

100

This malware attaches itself to a file or program and spreads only when that file is run.

Virus

100

What does HTTP stand for?

Hypertext Transfer Protocol.

200

Where are session cookies stored?

Temporary memory (RAM)

200

Explain the main aim of a DDoS attack.

to make a website or service unavailable by overwhelming it with traffic

200

Compare phishing and pharming in terms of how each tricks the user.

Phishing uses fake messages or links to lure users; pharming redirects them automatically even when they type the correct address.

200

Name two features of a web browser.

(Any two) Bookmarks/favourites, history, tabs, cookies, navigation tools, address bar.

300

Why does a persistent cookie remain after the browser is closed?

Because it is stored on the hard drive/SSD until expiry or deletion.

300

Explain the role of firewall.  

This type of software helps block unauthorized access by filtering incoming and outgoing network traffic.

300

Why is regularly updating software and operating systems important for preventing malware infections?

Because updates patch security vulnerabilities that malware might exploit.

300

Explain the difference between session cookies and persistent cookies, with one example of each.

Session cookies = temporary (e.g., shopping cart during browsing). Persistent cookies = long-term (e.g., saved login details).

400

Compare the role of the browser in displaying HTML with the role of the DNS server in locating the web page.

Browser = interprets HTML for display. DNS = resolves domain name to IP so browser can find server.

400

Why might relying only on anti-virus software be insufficient to prevent malware infections in an organization?

Because anti-virus reacts after infection; organizations also need firewalls, regular updates, and user awareness to prevent attacks in the first place.

400

A hospital’s systems are hit with ransomware. Besides paying the ransom, what prevention measures should have been in place?

Regular backups, patched systems, and employee awareness training to avoid malware infections.

400

What are the main components of a URL?
Give four.

protocol, domain host, domain name, domain type, country code, path/file name

500

Explain how data encryption in HTTPS prevents a “man-in-the-middle attack.”

Encryption scrambles data with a key, preventing attackers from reading/intercepting during transmission.

500

State two functions of a proxy server.

This network tool can cache web pages to improve speed and provide anonymity by hiding a user’s IP address

500

BONUS

BONUS

500

How does the SSL protocol create a secure connection?

  1. The web server sends its SSL certificate to the browser.

  2. The browser checks the certificate is valid and trusted.

  3. Both sides then exchange encryption keys.

  4. From then on, all data is sent in encrypted form, creating a secure connection.

500

Describe the process that takes place when a user enters a URL into a web browser to retrieve and display a web page.

  • The web browser sends a request to a DNS server to resolve the domain name.

  • The DNS server returns the corresponding IP address of the web server.

  • The browser uses this IP address to send a request to the web server.

  • The web server locates the requested files (usually HTML and related files such as CSS, images, JavaScript).

  • The web server sends the files back to the browser.

  • The browser interprets the HTML and displays the web page to the user.