This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Cyber Security Privacy – Anonymity & Pseudonymity”.
1. The term _____________ means taking care of a user’s name as well as the identity hidden or veiled using a variety of applications.
a) pseudonymous
b) anonymous
c) eponymous
d) homonymous
View Answer
Explanation: The term anonymous means taking care of a user’s name as well as the identity is hidden or veiled using a variety of applications. Some data are kept anonymous for maintaining privacy or protecting them from cyber-crimes like personal identity theft.
2. Sometimes __________________ anonymize them to perform criminal activities.
a) virus
b) incident handlers
c) cyber-criminals
d) ethical hackers
View Answer
Explanation: Sometimes cyber-criminals anonymize their identity or network to perform criminal activities so that it becomes difficult by forensic investigators or cyber cell to identify them.
3. An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online.
a) intranet
b) extranet
c) complex network
d) anonymity network
View Answer
Explanation: An anonymity network allows users to access the web while blocking the trackers or agents that keep tracking the identity online. Some data are kept anonymous for maintaining privacy or protecting them from cyber-crimes like personal identity theft.
4. _________ services are examples of anonymity services that conceal the location and usage of any user.
a) Tor
b) Encrypted router
c) Firewall
d) HTTPS
View Answer
Explanation: Tor services are examples of anonymity services that conceal the location and usage of any user. An anonymity network allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online.
5. Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers.
a) True
b) False
View Answer
Explanation: Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers.
6. Which of the following is not an example of approaches for maintaining anonymity?
a) Use of VPNs
b) Use of Tor Browser
c) Use of Proxy servers
d) Use of Antivirus
View Answer
Explanation: An anonymity network allows users to block the trackers or agents which track the identity online. Use of VPNs, Tor Browser, proxy servers are examples of approaches usually taken by online users for maintaining anonymity.
7. Which of the following is not an example of approaches for maintaining anonymity?
a) Using encrypted search engines that don’t share your search data
b) Use firewalls
c) Fake email services
d) Use file shielders
View Answer
Explanation: Using encrypted search engines that don’t share your search data, fake email services, file shielders are examples of approaches usually taken by online users for maintaining anonymity.
8. Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices.
a) True
b) False
View Answer
Explanation: Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices which hamper our e-privacy.
9. Which of the following is not a VPN used for preserving our anonymity?
a) Nord VPN
b) Express VPN
c) Microsoft Security Essential
d) CyberGhost
View Answer
Explanation: An anonymity network allows users to access the web while blocking the trackers or agents that keep tracing the identity online. Nord VPN, Express VPN, and CyberGhost are examples of VPNs that can preserve your anonymity.
10. __________________ are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy.
a) Paid search engines
b) Incognito mode
c) In-private mode
d) Private search engines
View Answer
Explanation: Private search engines are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy and users can use them for free.
11. Which of the following is a private search engine?
a) Bing
b) Google
c) Duckduckgo
d) Yahoo
View Answer
Explanation: There are different private search engines that are designed not to take our searched data or browsing habits. Hence it does not hamper users’ online privacy and security. Duckduckgo is an example of such SE.
12. Which of the following is not a private search engine?
a) StartPage
b) Baidu
c) SearX.me
d) Qwant
View Answer
Explanation: Baidu is not a private search engine. Private search engines are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy and users can use them for free.
13. Which of the below-mentioned search engine can provide you with anonymity while searching?
a) Privatelee
b) Baidu
c) Google
d) Bing
View Answer
Explanation: Privatelee is a private search engine that can provide users with anonymity. Private search engines are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy and users can use them for free.
Sanfoundry Global Education & Learning Series – Cyber Security.
To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Apply for Computer Science Internship
- Check Computer Science Books
- Check Programming Books
- Check Cyber Security Books
- Practice Programming MCQs