DT
PT
Subscribe To Print Edition About The Tribune Code Of Ethics Download App Advertise with us Classifieds
search-icon-img
search-icon-img
Advertisement

Daily Quiz-179

MCQs on the dark web and Tor network
  • fb
  • twitter
  • whatsapp
  • whatsapp
featured-img featured-img
iStock photo
Advertisement

1. Which of the following is NOT a legal use of the dark web?

Advertisement

A. Sharing academic journals via .onion domains

B. Secure whistleblowing in authoritarian regimes

Advertisement

C. Hosting ransomware-for-hire services

D. Running privacy-focused email services

Advertisement

2. The principle of ‘plausible deniability’ in cybersecurity is best demonstrated in:

A. Static IP masking

B. Blockchain transactions

C. Onion routing in Tor

D. DNS tunnelling

3. Consider the following pairs:

TermDescription
1. Surface WebIndexed and publicly accessible sites
2. Deep WebHidden illegal markets
3. Dark WebPrivate data like emails and e-banking

Which of the above pairs is/are correctly matched?

A. 1 only

B. 1 and 2 only

C. 2 and 3 only

D. None

4. Which of the following technical flaws may compromise anonymity on the dark web?

A. Use of cryptocurrency

B. Enabling JavaScript

C. Use of .onion domain

D. Use of Linux-based OS

5. Which international organisation is known to actively monitor the dark web for cyber threats and trafficking?

A. WHO

B. Interpol

C. UNESCO

D. UNDP

Answers Quiz-178 (August 3)

  1. C

Explanation: Tor uses .onion routing, which involves multiple layers of encryption sent through a random path of three or more nodes (entry, middle, exit). This ensures anonymity by obscuring both source and destination.

  1. B

Explanation: Deep Web refers to unindexed content (e.g., bank portals), while Dark Web is a subset that is intentionally hidden, encrypted, and accessible using special tools like Tor.

  1. B

Explanation: The exit node is the final node that sends the request to the destination site, thus masking the user’s real IP. It can see the unencrypted data if not using HTTPS.

  1. C

Explanation: Even within the Tor network, .onion sites often use HTTPS over TLS to encrypt content, ensuring secure communication between client and server.

  1. C

Explanation: Logging into personal accounts (e.g., Gmail, Facebook) compromises anonymity by linking activity to real-world identity, negating Tor’s protective layers.

Advertisement
Advertisement
Advertisement
tlbr_img1 Classifieds tlbr_img2 Videos tlbr_img3 Premium tlbr_img4 E-Paper tlbr_img5 Shorts