Daily Quiz-179
Unlock Exclusive Insights with The Tribune Premium
Take your experience further with Premium access. Thought-provoking Opinions, Expert Analysis, In-depth Insights and other Member Only Benefits1. Which of the following is NOT a legal use of the dark web?
A. Sharing academic journals via .onion domains
B. Secure whistleblowing in authoritarian regimes
C. Hosting ransomware-for-hire services
D. Running privacy-focused email services
2. The principle of ‘plausible deniability’ in cybersecurity is best demonstrated in:
A. Static IP masking
B. Blockchain transactions
C. Onion routing in Tor
D. DNS tunnelling
3. Consider the following pairs:
Term | Description |
1. Surface Web | Indexed and publicly accessible sites |
2. Deep Web | Hidden illegal markets |
3. Dark Web | Private data like emails and e-banking |
Which of the above pairs is/are correctly matched?
A. 1 only
B. 1 and 2 only
C. 2 and 3 only
D. None
4. Which of the following technical flaws may compromise anonymity on the dark web?
A. Use of cryptocurrency
B. Enabling JavaScript
C. Use of .onion domain
D. Use of Linux-based OS
5. Which international organisation is known to actively monitor the dark web for cyber threats and trafficking?
A. WHO
B. Interpol
C. UNESCO
D. UNDP
Answers Quiz-178 (August 3)
- C
Explanation: Tor uses .onion routing, which involves multiple layers of encryption sent through a random path of three or more nodes (entry, middle, exit). This ensures anonymity by obscuring both source and destination.
- B
Explanation: Deep Web refers to unindexed content (e.g., bank portals), while Dark Web is a subset that is intentionally hidden, encrypted, and accessible using special tools like Tor.
- B
Explanation: The exit node is the final node that sends the request to the destination site, thus masking the user’s real IP. It can see the unencrypted data if not using HTTPS.
- C
Explanation: Even within the Tor network, .onion sites often use HTTPS over TLS to encrypt content, ensuring secure communication between client and server.
- C
Explanation: Logging into personal accounts (e.g., Gmail, Facebook) compromises anonymity by linking activity to real-world identity, negating Tor’s protective layers.