

MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
The term _____________ means taking care of a user’s name as well as the identity hidden or veiled using a variety of applications. |
A. | pseudonymous |
B. | anonymous |
C. | eponymous |
D. | homonymous |
Answer» C. eponymous | |
2. |
An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online. |
A. | intranet |
B. | extranet |
C. | complex network |
D. | anonymity network |
Answer» E. | |
3. |
Your online activity can still be tracked even if you use different Tor services, but not in much detail. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
4. |
Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
5. |
Which of the below-mentioned search engine can provide you with anonymity while searching? |
A. | Privatelee |
B. | Baidu |
C. | |
D. | Bing |
Answer» B. Baidu | |
6. |
The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year ____________ |
A. | 2000 |
B. | 2001 |
C. | 2002 |
D. | 2003 |
Answer» C. 2002 | |
7. |
The popular computer scientist _____________ has coined the term “deep web” in the year 2001. |
A. | Mr. Tim B. Lee |
B. | Mr. Narcos Maralli |
C. | Mr. Michael K. Bergman |
D. | Mr. Ken Thompson |
Answer» D. Mr. Ken Thompson | |
8. |
Sometimes __________________ anonymize them to perform criminal activities. |
A. | virus |
B. | incident handlers |
C. | cyber-criminals |
D. | ethical hackers |
Answer» D. ethical hackers | |
9. |
Which of the following is a private search engine? |
A. | Bing |
B. | |
C. | Duckduckgo |
D. | Yahoo |
Answer» D. Yahoo | |
10. |
__________________ are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy. |
A. | Paid search engines |
B. | Incognito mode |
C. | In-private mode |
D. | Private search engines |
Answer» E. | |
11. |
Which of the following is not a VPN used for preserving our anonymity? |
A. | Nord VPN |
B. | Express VPN |
C. | Microsoft Security Essential |
D. | CyberGhost |
Answer» D. CyberGhost | |
12. |
Which of the following is not a private search engine? |
A. | StartPage |
B. | Baidu |
C. | SearX.me |
D. | Qwant |
Answer» C. SearX.me | |
13. |
The __________ was a huge marketplace of Dark Web specifically famous for selling of illegal drugs & narcotics as well as you can find a wide range of other goods for sale. |
A. | Silk Road |
B. | Cotton Road |
C. | Dark Road |
D. | Drug Road |
Answer» B. Cotton Road | |
14. |
A special tool is necessary for entering the network which is _______________ that helps the anonymous internet users to access into the Tor’s network and use various Tor services. |
A. | Opera browser |
B. | Mozilla browser |
C. | Chrome browser |
D. | Tor browser |
Answer» E. | |
15. |
Which of the following is not an example of approaches for maintaining anonymity? |
A. | Use of VPNs |
B. | Use of Tor Browser |
C. | Use of Proxy servers |
D. | Use of Antivirus |
Answer» E. | |
16. |
Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
17. |
_________ services are examples of anonymity services that conceal the location and usage of any user. |
A. | Tor |
B. | Encrypted router |
C. | Firewall |
D. | HTTPS |
Answer» B. Encrypted router | |
18. |
Which of the following online services’ privacy cannot be protected using Tor? |
A. | Instant messaging |
B. | Browsing data |
C. | Relay chats |
D. | Login using ID |
Answer» E. | |
19. |
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
20. |
___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion. |
A. | Privacy routing |
B. | Onion routing |
C. | Turbo routing |
D. | DHCP routing |
Answer» C. Turbo routing | |