Cyber Security Questions and Answers – Cyber Security Privacy – Anonymity & Pseudonymity

This set of Cyber Security written test Questions & Answers focuses on “Cyber Security Privacy – Anonymity & Pseudonymity”.

1. The term _____________ means taking care of a user’s name as well as the identity hidden or veiled using a variety of applications.
a) pseudonymous
b) anonymous
c) eponymous
d) homonymous
View Answer

Answer: b
Explanation: The term anonymous means taking care of a user’s name as well as the identity is hidden or veiled using a variety of applications. Some data are kept anonymous for maintaining privacy or protecting them from cyber-crimes like personal identity theft.

2. Sometimes __________________ anonymize them to perform criminal activities.
a) virus
b) incident handlers
c) cyber-criminals
d) ethical hackers
View Answer

Answer: c
Explanation: Sometimes cyber-criminals anonymize their identity or network to perform criminal activities so that it becomes difficult by forensic investigators or cyber cell to identify them.

3. An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online.
a) intranet
b) extranet
c) complex network
d) anonymity network
View Answer

Answer: d
Explanation: An anonymity network allows users to access the web while blocking the trackers or agents that keep tracking the identity online. Some data are kept anonymous for maintaining privacy or protecting them from cyber-crimes like personal identity theft.
advertisement
advertisement

4. _________ services are examples of anonymity services that conceal the location and usage of any user.
a) Tor
b) Encrypted router
c) Firewall
d) HTTPS
View Answer

Answer: a
Explanation: Tor services are examples of anonymity services that conceal the location and usage of any user. An anonymity network allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online.

5. Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers.
a) True
b) False
View Answer

Answer: a
Explanation: Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. Which of the following is not an example of approaches for maintaining anonymity?
a) Use of VPNs
b) Use of Tor Browser
c) Use of Proxy servers
d) Use of Antivirus
View Answer

Answer: d
Explanation: An anonymity network allows users to block the trackers or agents which track the identity online. Use of VPNs, Tor Browser, proxy servers are examples of approaches usually taken by online users for maintaining anonymity.

7. Which of the following is not an example of approaches for maintaining anonymity?
a) Using encrypted search engines that don’t share your search data
b) Use firewalls
c) Fake email services
d) Use file shielders
View Answer

Answer: b
Explanation: Using encrypted search engines that don’t share your search data, fake email services, file shielders are examples of approaches usually taken by online users for maintaining anonymity.
advertisement

8. Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices.
a) True
b) False
View Answer

Answer: a
Explanation: Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices which hamper our e-privacy.

9. Which of the following is not a VPN used for preserving our anonymity?
a) Nord VPN
b) Express VPN
c) Microsoft Security Essential
d) CyberGhost
View Answer

Answer: c
Explanation: An anonymity network allows users to access the web while blocking the trackers or agents that keep tracing the identity online. Nord VPN, Express VPN, and CyberGhost are examples of VPNs that can preserve your anonymity.
advertisement

10. __________________ are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy.
a) Paid search engines
b) Incognito mode
c) In-private mode
d) Private search engines
View Answer

Answer: d
Explanation: Private search engines are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy and users can use them for free.

11. Which of the following is a private search engine?
a) Bing
b) Google
c) Duckduckgo
d) Yahoo
View Answer

Answer: c
Explanation: There are different private search engines that are designed not to take our searched data or browsing habits. Hence it does not hamper users’ online privacy and security. Duckduckgo is an example of such SE.

12. Which of the following is not a private search engine?
a) StartPage
b) Baidu
c) SearX.me
d) Qwant
View Answer

Answer: b
Explanation: Baidu is not a private search engine. Private search engines are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy and users can use them for free.

13. Which of the below-mentioned search engine can provide you with anonymity while searching?
a) Privatelee
b) Baidu
c) Google
d) Bing
View Answer

Answer: a
Explanation: Privatelee is a private search engine that can provide users with anonymity. Private search engines are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy and users can use them for free.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all written questions on Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.