Cyber Security Questions and Answers – Cyber Security Privacy – Tor Services

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Cyber Security Privacy – Tor Services”.

1. _____________ makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy.
a) AnonyMode
b) In-private mode
c) Incognito mode
d) Tor
View Answer

Answer: d
Explanation: Tor makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy.

2. TOR stands for _______________
a) The Open Router
b) The Onion Reader
c) The Onion Router
d) Tactical Onion Router
View Answer

Answer: c
Explanation: Tor is abbreviated as The Onion Router, is an open-source program which allows internet users to shield their privacy as well as security and data gathering techniques.

3. Tor services are also popularly known as _____________
a) onion services
b) garlic services
c) privacy policy service
d) anti-surveillance service
View Answer

Answer: a
Explanation: The Onion Router (TOR) is an open-source service that allows internet users to preserve their privacy as well as security against different online surveillance.
advertisement
advertisement

4. Tor was originally designed for the _____________ for protecting government communications.
a) U.S. Navy
b) Indian Navy
c) US army
d) Chinese cyber army
View Answer

Answer: a
Explanation: Tor is an open-source service designed to preserve privacy as well as security against different online. Tor was originally designed for the US Navy for protecting government communications.

5. Tor is written in ______ language having roughly 146,000 LOC (lines of code).
a) C#
b) C++
c) C
d) Objective C
View Answer

Answer: c
Explanation: Tor was originally designed for the US Navy for secure communication which was written in the popular C language having roughly 146,000 LOC (lines of code).
Note: Join free Sanfoundry classes at Telegram or Youtube

6. __________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.
a) AnonyMode
b) In-private mode
c) Incognito mode
d) Tor
View Answer

Answer: d
Explanation: Tor was at first designed for secure communication and preserving US Navy’s data privacy. It contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.

7. The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
a) AnonyMode
b) Tor
c) Incognito mode
d) In-private mode
View Answer

Answer: b
Explanation: The Tor is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
advertisement

8. Which of the following online services’ privacy cannot be protected using Tor?
a) Instant messaging
b) Browsing data
c) Relay chats
d) Login using ID
View Answer

Answer: d
Explanation: Login using ID will obviously take your ID in order to access your account and is not the headache of Tor. Privacy regarding instant messaging, browsing data, relay chats are some of the following online services protected by Tor.

9. Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.
a) True
b) False
View Answer

Answer: a
Explanation: Privacy regarding instant messaging, browsing data, relay chats are some of the following online services protected by Tor hence it is used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.
advertisement

10. ___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion.
a) Privacy routing
b) Onion routing
c) Turbo routing
d) DHCP routing
View Answer

Answer: b
Explanation: Onion routing is employed by encrypting the application layer with a communication protocol stack, nested in various layers of the onion. This service is used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.