Cyber Security Multiple Choice Questions on “Cyber Security Privacy – Tor Services”.
1. _____________ makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy.
a) AnonyMode
b) In-private mode
c) Incognito mode
d) Tor
Answer: d
Clarification: Tor makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy.
2. TOR stands for _______________
a) The Open Router
b) The Onion Reader
c) The Onion Router
d) Tactical Onion Router
Answer: c
Clarification: Tor is abbreviated as The Onion Router, is an open-source program which allows internet users to shield their privacy as well as security and data gathering techniques.
3. Tor services are also popularly known as _____________
a) onion services
b) garlic services
c) privacy policy service
d) anti-surveillance service
Answer: a
Clarification: The Onion Router (TOR) is an open-source service that allows internet users to preserve their privacy as well as security against different online surveillance.
4. Tor was originally designed for the _____________ for protecting government communications.
a) U.S. Navy
b) Indian Navy
c) US army
d) Chinese cyber army
Answer: a
Clarification: Tor is an open-source service designed to preserve privacy as well as security against different online. Tor was originally designed for the US Navy for protecting government communications.
5. Tor is written in ______ language having roughly 146,000 LOC (lines of code).
a) C#
b) C++
c) C
d) Objective C
Answer: c
Clarification: Tor was originally designed for the US Navy for secure communication which was written in the popular C language having roughly 146,000 LOC (lines of code).
6. __________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.
a) AnonyMode
b) In-private mode
c) Incognito mode
d) Tor
Answer: d
Clarification: Tor was at first designed for secure communication and preserving US Navy’s data privacy. It contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.
7. The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
a) AnonyMode
b) Tor
c) Incognito mode
d) In-private mode
Answer: b
Clarification: The Tor is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
8. Which of the following online services’ privacy cannot be protected using Tor?
a) Instant messaging
b) Browsing data
c) Relay chats
d) Login using ID
Answer: d
Clarification: Login using ID will obviously take your ID in order to access your account and is not the headache of Tor. Privacy regarding instant messaging, browsing data, relay chats are some of the following online services protected by Tor.
9. Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.
a) True
b) False
Answer: a
Clarification: Privacy regarding instant messaging, browsing data, relay chats are some of the following online services protected by Tor hence it is used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.
10. ___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion.
a) Privacy routing
b) Onion routing
c) Turbo routing
d) DHCP routing
Answer: b
Clarification: Onion routing is employed by encrypting the application layer with a communication protocol stack, nested in various layers of the onion. This service is used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.