

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion. |
A. | Privacy routing |
B. | Onion routing |
C. | Turbo routing |
D. | DHCP routing |
Answer» C. Turbo routing | |
2. |
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc. |
A. | True |
B. | False |
Answer» B. False | |
3. |
Which of the following online services’ privacy cannot be protected using Tor? |
A. | Instant messaging |
B. | Browsing data |
C. | Relay chats |
D. | Login using ID |
Answer» E. | |
4. |
____________________IS_EMPLOYED_BY_ENCRYPTING_THE_APPLICATION_LAYER_WITH_A_COMMUNICATION_PROTOCOL_STACK,_NESTED_IN_VARIOUS_LAYERS_OF_ONION.?$ |
A. | Privacy routing |
B. | Onion routing |
C. | Turbo routing |
D. | DHCP routing |
Answer» C. Turbo routing | |
5. |
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc? |
A. | True |
B. | False |
Answer» B. False | |
6. |
Which of the following online services’ privacy cannot be protected using Tor?# |
A. | Instant messaging |
B. | Browsing data |
C. | Relay chats |
D. | Login using ID |
Answer» E. | |
7. |
The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks. |
A. | AnonyMode |
B. | Tor |
C. | Incognito mode |
D. | In-private mode |
Answer» C. Incognito mode | |
8. |
__________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online. |
A. | AnonyMode |
B. | In-private mode |
C. | Incognito mode |
D. | Tor |
Answer» E. | |
9. |
Tor is written in ______ language having roughly 146,000 LOC (lines of code). |
A. | C |
B. | C++ |
C. | C |
D. | Objective C |
Answer» D. Objective C | |
10. |
Tor was originally designed for the _____________ for protecting government communications. |
A. | U.S. Navy |
B. | Indian Navy |
C. | US army |
D. | Chinese cyber army |
Answer» B. Indian Navy | |
11. |
Tor services are also popularly known as _____________ |
A. | onion services |
B. | garlic services |
C. | privacy policy service |
D. | anti-surveillance service |
Answer» B. garlic services | |
12. |
TOR stands for _______________ |
A. | The Open Router |
B. | The Onion Reader |
C. | The Onion Router |
D. | Tactical Onion Router |
Answer» D. Tactical Onion Router | |
13. |
_____________ makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy. |
A. | AnonyMode |
B. | In-private mode |
C. | Incognito mode |
D. | Tor |
Answer» E. | |