MCQ-1 Answers PDF

Title MCQ-1 Answers
Course Dark Web
Institution Charles Sturt University
Pages 2
File Size 65.8 KB
File Type PDF
Total Downloads 82
Total Views 163

Summary

Answers on MCQ-1...


Description

MCQ-1: Answers Which one of the following is NOT true for The Onion Router? a. Many applications can share one circuit. b. Tor router doesn’t need root privileges. c. It can attempt to protect against monitoring of traffic at the boundaries of the Tor network d. It can maintain lists of active relay nodes, their locations and current public keys using directory servers. Which one of the following is an example of unlinkability? a. Your activities are hidden among others’ similar activities. b. The adversary can’t tell whether someone is using a particular system and/or protocol c. The sender and their email are no more related after an adversary’s observations than they were before. d. The person is not identifiable within a set of subjects Which one of the following techniques is an essential tactic for the commission of many, often complex, cyber-dependent and cyber-facilitated crimes? a. b. c. d.

cryptanalysis social engineering steganography CSEM

__________crime factors are those which impact on, facilitate or otherwise contribute to multiple crime areas but are not necessarily inherently criminal themselves. a. b. c. d.

Cross-cutting Backdoor Cryptanalytic CSEM

Which one of the following targeted specific organisations to attach and encrypts the data on the compromised system? a. b. c. d.

PETYA SAMSAM CRYSIS Locky

Which one of the following are scripts embedded in a web page that exploit a vulnerability in the user's browser? a. Trojan downloads

b. phishing web c. drive-by exploits d. worms Tor is implemented for a communication protocol stack by encryption into the __________, nested like the layers of an onion. a. b. c. d.

outer layer inner layer network layer application layer

Which one of the following are the most popular sites and a major Dark Web marketplace is known mainly for selling illegal drugs as well as a wide range of other items? a. b. c. d.

The Onion Router Silk Road Hansa none of the above

_______________continues to be one of the most prominent malware threats in terms of the variety and range of its victims and the damage done. a. b. c. d.

Bootnet Ransomware SQL Injection XSS

Tor does not have functionalities that can prevent ____________________, therefore, traffic entering or exiting from its overlay network can easily be detected. a. b. c. d.

traffic monitoring at its boundaries network monitoring at its boundaries drug monitoring at its boundaries forum monitoring at its boundaries...


Similar Free PDFs