TrendingVideosIndia
Opinions | CommentEditorialsThe MiddleLetters to the EditorReflections
Sports
State | Himachal PradeshPunjabJammu & KashmirHaryanaChhattisgarhMadhya PradeshRajasthanUttarakhandUttar Pradesh
City | ChandigarhAmritsarJalandharLudhianaDelhiPatialaBathindaShaharnama
World | United StatesPakistan
Diaspora
Features | The Tribune ScienceTime CapsuleSpectrumIn-DepthTravelFood
Business | My MoneyAutoZone
News Columns | Kashmir AngleJammu JournalInside the CapitalHimachal CallingHill View
Don't Miss
Advertisement

Daily Quiz-179

MCQs on the dark web and Tor network
iStock photo

Unlock Exclusive Insights with The Tribune Premium

Take your experience further with Premium access. Thought-provoking Opinions, Expert Analysis, In-depth Insights and other Member Only Benefits
Yearly Premium ₹999 ₹349/Year
Yearly Premium $49 $24.99/Year
Advertisement

1. Which of the following is NOT a legal use of the dark web?

Advertisement

A. Sharing academic journals via .onion domains

Advertisement

B. Secure whistleblowing in authoritarian regimes

C. Hosting ransomware-for-hire services

D. Running privacy-focused email services

Advertisement

2. The principle of ‘plausible deniability’ in cybersecurity is best demonstrated in:

A. Static IP masking

B. Blockchain transactions

C. Onion routing in Tor

D. DNS tunnelling

3. Consider the following pairs:

TermDescription
1. Surface WebIndexed and publicly accessible sites
2. Deep WebHidden illegal markets
3. Dark WebPrivate data like emails and e-banking

Which of the above pairs is/are correctly matched?

A. 1 only

B. 1 and 2 only

C. 2 and 3 only

D. None

4. Which of the following technical flaws may compromise anonymity on the dark web?

A. Use of cryptocurrency

B. Enabling JavaScript

C. Use of .onion domain

D. Use of Linux-based OS

5. Which international organisation is known to actively monitor the dark web for cyber threats and trafficking?

A. WHO

B. Interpol

C. UNESCO

D. UNDP

Answers Quiz-178 (August 3)

  1. C

Explanation: Tor uses .onion routing, which involves multiple layers of encryption sent through a random path of three or more nodes (entry, middle, exit). This ensures anonymity by obscuring both source and destination.

  1. B

Explanation: Deep Web refers to unindexed content (e.g., bank portals), while Dark Web is a subset that is intentionally hidden, encrypted, and accessible using special tools like Tor.

  1. B

Explanation: The exit node is the final node that sends the request to the destination site, thus masking the user’s real IP. It can see the unencrypted data if not using HTTPS.

  1. C

Explanation: Even within the Tor network, .onion sites often use HTTPS over TLS to encrypt content, ensuring secure communication between client and server.

  1. C

Explanation: Logging into personal accounts (e.g., Gmail, Facebook) compromises anonymity by linking activity to real-world identity, negating Tor’s protective layers.

Advertisement
Show comments
Advertisement