MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion. |
| A. | Privacy routing |
| B. | Onion routing |
| C. | Turbo routing |
| D. | DHCP routing |
| Answer» C. Turbo routing | |
| 2. |
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 3. |
Which of the following online services’ privacy cannot be protected using Tor? |
| A. | Instant messaging |
| B. | Browsing data |
| C. | Relay chats |
| D. | Login using ID |
| Answer» E. | |
| 4. |
____________________IS_EMPLOYED_BY_ENCRYPTING_THE_APPLICATION_LAYER_WITH_A_COMMUNICATION_PROTOCOL_STACK,_NESTED_IN_VARIOUS_LAYERS_OF_ONION.?$ |
| A. | Privacy routing |
| B. | Onion routing |
| C. | Turbo routing |
| D. | DHCP routing |
| Answer» C. Turbo routing | |
| 5. |
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 6. |
Which of the following online services’ privacy cannot be protected using Tor?# |
| A. | Instant messaging |
| B. | Browsing data |
| C. | Relay chats |
| D. | Login using ID |
| Answer» E. | |
| 7. |
The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks. |
| A. | AnonyMode |
| B. | Tor |
| C. | Incognito mode |
| D. | In-private mode |
| Answer» C. Incognito mode | |
| 8. |
__________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online. |
| A. | AnonyMode |
| B. | In-private mode |
| C. | Incognito mode |
| D. | Tor |
| Answer» E. | |
| 9. |
Tor is written in ______ language having roughly 146,000 LOC (lines of code). |
| A. | C |
| B. | C++ |
| C. | C |
| D. | Objective C |
| Answer» D. Objective C | |
| 10. |
Tor was originally designed for the _____________ for protecting government communications. |
| A. | U.S. Navy |
| B. | Indian Navy |
| C. | US army |
| D. | Chinese cyber army |
| Answer» B. Indian Navy | |
| 11. |
Tor services are also popularly known as _____________ |
| A. | onion services |
| B. | garlic services |
| C. | privacy policy service |
| D. | anti-surveillance service |
| Answer» B. garlic services | |
| 12. |
TOR stands for _______________ |
| A. | The Open Router |
| B. | The Onion Reader |
| C. | The Onion Router |
| D. | Tactical Onion Router |
| Answer» D. Tactical Onion Router | |
| 13. |
_____________ makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy. |
| A. | AnonyMode |
| B. | In-private mode |
| C. | Incognito mode |
| D. | Tor |
| Answer» E. | |