This is a computer science engineering quiz on cybersecurity, which includes questions on privacy in cybersecurity and the deepweb.
TOR stands for _______________
Tor was originally designed for the _____________ for protecting government communications.
Tor is written in ______ language having roughly 146,000 LOC (lines of code).
__________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.
The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
Which of the following online services’ privacy cannot be protected using Tor?
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.
___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion.
The ____________ is anything which your search engine cannot search.
________________ is a network construct over the internet that is encrypted. It offers anonymity to its users. Tor (The Onion Router) is a common service of Darknet.
A special tool is necessary for entering the network which is _______________ that helps the anonymous internet users to access into the Tor’s network and use various Tor services.
____________ is also a part of darknet that is employed for transferring files anonymously.
Tor services are also popularly known as _____________
Onion services
Garlic services
Privacy policy service
Anti-surveillance service
The ______________ is categorized as an unknown segment of the Deep Web which has been purposely kept hidden and is inaccessible using standard web browsers.
Haunted web
World Wide Web
Dark web
Surface web
_____________ makes it likely for its users to hide their physical locations andoffering a variety of services like web publishing or an IM maintaining privacy.
AnonyMode
In-private mode
Incognito mode
Tor