Cyber Security (CIE IGCSE Computer Science)

Topic Questions

1
Sme Calculator
5 marks

A company has a website that is stored on a web server.

The company is concerned about a distributed denial of service (DDoS) attack.

i)
Describe what is meant by a DDoS attack.
 [4]
ii)
Suggest one security device that can be used to help prevent a DDoS attack.
 [1]

Did this page help you?

2
Sme Calculator
6 marks

An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on its website.

Describe the process of SSL and explain how it provides a secure connection.

 [6]

Did this page help you?

3
Sme Calculator
4 marks

Five security or data loss issues are shown on the left-hand side.

Five possible methods of data recovery or protection are shown on the right.

Draw a line to match each definition/description of Issues to the most appropriate Methods of Data Recovery.

q11-paper1-spec2019-cie-igcse-computerscience

[4]

Did this page help you?

4a
Sme Calculator
6 marks

A firewall can be used to help keep the data secure that is stored on a computer.

a)
The given paragraph describes how the firewall operates to help keep the data secure.

Complete the paragraph using the most appropriate terms from the given list. Not all of the terms on the list need to be used.

• Accept
• Criteria
• Hacking
• Input
• Network
• Outgoing
• Output
• Processor
• Reject
• Software
• Store
• Storage

A firewall can be ............................................ or hardware based. It monitors traffic between the computer and the ............................................ The user sets ............................................ for the traffic. The firewall will .............................................. or ............................................ the traffic based on this. It can help prevent ............................................ and malicious software that could be a threat to the security of the data.
[6]
4b
Sme Calculator
3 marks
b)
Identify three other methods that could be used to keep the data secure.

Method 1 ..........................................................................
Method 2 ..........................................................................
Method 3 ...........................................................................
[3]

Did this page help you?

5
Sme Calculator
6 marks

Two internet risks are phishing and pharming.

Describe what is meant by phishing and pharming.

Phishing ...................................................................
Pharming .................................................................

[6]

Did this page help you?

6
Sme Calculator
2 marks

A music company has a website that allows users to stream music. The music is stored in sound files.

The web server that hosts the website suffers a denial of service (DoS) attack.

Explain why this will prevent users from accessing the website.

[2]

Did this page help you?

7
Sme Calculator
2 marks

Luke is creating a website for his t-shirt design business.

Luke is concerned that his web server may be hacked or subjected to a denial of service (DoS) attack.

State two security methods that Luke could use to help protect the web server from hacking or a DoS attack.

Method 1 .................................................................................

Method 2 .................................................................................

[2] 

Did this page help you?

8
Sme Calculator
7 marks

Tina is creating a website for charity events. She uses HTML to create the website.

Tina is concerned about security threats to her web server.
 

i)
Identify three security threats to her web server that Tina might be concerned about.
1 ........................................................................................
2 ........................................................................................
3 ........................................................................................

[3]

ii)
Tina installs a proxy server to help protect her website from security threats.

 Describe how the proxy server will help protect the website

[4]

Did this page help you?

9
Sme Calculator
4 marks

Alessandro has some important data stored on his computer.

He is concerned about accidental damage to his data.

a)

i)
Identify three ways that the data could be accidentally damaged.
1 ................................................................................................
2 ................................................................................................
3 ................................................................................................

[3]
 

ii)
State what Alessandro could do to make sure that he can retrieve his data if it is accidentally damaged.
[1]

Did this page help you?

10
Sme Calculator
3 marks

Eugene has a web server that stores his online shopping website.

Customers access the website using a browser.

State three online security threats to Eugene’s web server.

Threat 1 .......................................................................................
Threat 2 .......................................................................................
Threat 3 .......................................................................................

[3]

Did this page help you?

11a
Sme Calculator
1 mark

Phishing and pharming are two security issues a user should be aware of when using the Internet.

a)
State one similarity between phishing and pharming
[1]
11b
Sme Calculator
2 marks
b)
Explain two differences between phishing and pharming.

Difference 1 ....................................................................

Difference 2 ....................................................................   

[2]

Did this page help you?