Privacy and Deep Web MCQ part-1

The internet is a vast and ever-changing landscape, and it can be difficult to keep up with all the new terminology and technologies. However, it’s important to be aware of the different types of internet activity and how they can affect your privacy. The “deep web” is a term that refers to the parts of the internet that are not indexed by search engines, and it’s often associated with illegal or illicit activity. However, there are many legitimate reasons to access the deep web, and it’s important to understand how to do so safely and protect your privacy.

Que._____________ makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy.
a. AnonyMode
b. In-private mode
c. Incognito mode
d. Tor
Que.TOR stands for _______________
a. The Open Router
b. The Onion Reader
c. The Onion Router
d. Tactical Onion Router
Que.Tor services are also popularly known as _____________
a. onion services
b. garlic services
c. privacy policy service
d. anti-surveillance service
Que.Tor was originally designed for the _____________ for protecting government communications.
a. U.S. Navy
b. Indian Navy
c. US army
d. Chinese cyber army
Que.Tor is written in ______ language having roughly 146,000 LOC (lines of code).
a. C#
b. C++
c. C
d. Objective C
Que.__________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.
a. AnonyMode
b. In-private mode
c. Incognito mode
d. Tor
Que.The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
a. AnonyMode
b. Tor
c. Incognito mode
d. In-private mode
Que.Which of the following online services’ privacy cannot be protected using Tor?
a. Instant messaging
b. Browsing data
c. Relay chats
d. Login using ID
Que.Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.
a. True
b. False
c. May be True or False
d. Can’t say
Que.___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion.
a. Privacy routing
b. Onion routing
c. Turbo routing
d. DHCP routing