Title | MCQ-1 Answers |
---|---|
Course | Dark Web |
Institution | Charles Sturt University |
Pages | 2 |
File Size | 65.8 KB |
File Type | |
Total Downloads | 82 |
Total Views | 163 |
Answers on MCQ-1...
MCQ-1: Answers Which one of the following is NOT true for The Onion Router? a. Many applications can share one circuit. b. Tor router doesn’t need root privileges. c. It can attempt to protect against monitoring of traffic at the boundaries of the Tor network d. It can maintain lists of active relay nodes, their locations and current public keys using directory servers. Which one of the following is an example of unlinkability? a. Your activities are hidden among others’ similar activities. b. The adversary can’t tell whether someone is using a particular system and/or protocol c. The sender and their email are no more related after an adversary’s observations than they were before. d. The person is not identifiable within a set of subjects Which one of the following techniques is an essential tactic for the commission of many, often complex, cyber-dependent and cyber-facilitated crimes? a. b. c. d.
cryptanalysis social engineering steganography CSEM
__________crime factors are those which impact on, facilitate or otherwise contribute to multiple crime areas but are not necessarily inherently criminal themselves. a. b. c. d.
Cross-cutting Backdoor Cryptanalytic CSEM
Which one of the following targeted specific organisations to attach and encrypts the data on the compromised system? a. b. c. d.
PETYA SAMSAM CRYSIS Locky
Which one of the following are scripts embedded in a web page that exploit a vulnerability in the user's browser? a. Trojan downloads
b. phishing web c. drive-by exploits d. worms Tor is implemented for a communication protocol stack by encryption into the __________, nested like the layers of an onion. a. b. c. d.
outer layer inner layer network layer application layer
Which one of the following are the most popular sites and a major Dark Web marketplace is known mainly for selling illegal drugs as well as a wide range of other items? a. b. c. d.
The Onion Router Silk Road Hansa none of the above
_______________continues to be one of the most prominent malware threats in terms of the variety and range of its victims and the damage done. a. b. c. d.
Bootnet Ransomware SQL Injection XSS
Tor does not have functionalities that can prevent ____________________, therefore, traffic entering or exiting from its overlay network can easily be detected. a. b. c. d.
traffic monitoring at its boundaries network monitoring at its boundaries drug monitoring at its boundaries forum monitoring at its boundaries...