InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Tor (The Onion Router) is not a service or part of the darknet.(a) True(b) FalseThe question was asked during an interview.Question is taken from Deep Web and Darknet topic in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right answer is (b) False |
|
| 2. |
Deep web is also known as ______________(a) Freenet(b) Darknet(c) ARPANET(d) Hidden webThis question was posed to me during an internship interview.Asked question is from Deep Web and Darknet topic in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right choice is (d) Hidden WEB |
|
| 3. |
Your online activity can still be tracked even if you use different Tor services, but not in much detail.(a) True(b) FalseThe question was posed to me during a job interview.My enquiry is from Deep Web and Darknet topic in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right answer is (a) True |
|
| 4. |
The __________ was a huge marketplace of Dark Web specifically famous for selling of illegal drugs & narcotics as well as you can find a wide range of other goods for sale.(a) Silk Road(b) Cotton Road(c) Dark Road(d) Drug RoadI had been asked this question by my school teacher while I was bunking the class.This is a very interesting question from Deep Web and Darknet in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» The CORRECT OPTION is (a) Silk Road |
|
| 5. |
The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year ____________(a) 2000(b) 2001(c) 2002(d) 2003The question was posed to me by my school principal while I was bunking the class.My question comes from Deep Web and Darknet topic in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» The correct ANSWER is (b) 2001 |
|
| 6. |
The popular computer scientist _____________ has coined the term “deep web” in the year 2001.(a) Mr. Tim B. Lee(b) Mr. Narcos Maralli(c) Mr. Michael K. Bergman(d) Mr. Ken ThompsonThe question was posed to me in exam.Question is from Deep Web and Darknet in chapter Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct CHOICE is (c) Mr. Michael K. Bergman |
|
| 7. |
One example of a popular website on ______________ is the silk-road that was used to sell drugs that were later taken down by the FBI.(a) Freenet(b) Darknet(c) ARPANET(d) StuxnetThe question was asked in a national level competition.My query is from Deep Web and Darknet in chapter Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» The correct answer is (B) DARKNET |
|
| 8. |
A special tool is necessary for entering the network which is _______________ that helps the anonymous internet users to access into the Tor’s network and use various Tor services.(a) Opera browser(b) Mozilla browser(c) Chrome browser(d) Tor browserThe question was asked during a job interview.I need to ask this question from Deep Web and Darknet topic in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right ANSWER is (d) TOR browser |
|
| 9. |
____________ is also a part of darknet that is employed for transferring files anonymously.(a) Freenet(b) Darknet(c) ARPANET(d) StuxnetThe question was asked in homework.Enquiry is from Deep Web and Darknet in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» CORRECT option is (a) Freenet The explanation: A NETWORK construct over the internet that is encrypted and not ALWAYS accessible is the DARKNET. It offers anonymity to its users. Freenet is also a part of darknet that is EMPLOYED for transferring files anonymously. |
|
| 10. |
________________ is a network construct over the internet that is encrypted. It offers anonymity to its users. Tor (The Onion Router) is a common service of Darknet.(a) Freenet(b) Darknet(c) ARPANET(d) StuxnetThe question was posed to me in quiz.I need to ask this question from Deep Web and Darknet topic in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct option is (B) Darknet |
|
| 11. |
The ______________ is categorized as an unknown segment of the Deep Web which has been purposely kept hidden & is inaccessible using standard web browsers.(a) Haunted web(b) World Wide Web(c) Dark web(d) Surface webI have been asked this question during an online interview.My doubt stems from Deep Web and Darknet topic in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right choice is (C) Dark web |
|
| 12. |
The ____________ is anything which your search engine cannot search.(a) Haunted web(b) World Wide Web(c) Surface web(d) Deep WebThe question was posed to me in final exam.The origin of the question is Deep Web and Darknet topic in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» The correct OPTION is (d) DEEP Web |
|
| 13. |
Which of the below-mentioned search engine can provide you with anonymity while searching?(a) Privatelee(b) Baidu(c) Google(d) BingThe question was asked by my college director while I was bunking the class.I would like to ask this question from Cyber Security Privacy in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» CORRECT answer is (a) Privatelee Easiest explanation: Privatelee is a private search engine that can provide USERS with anonymity. Private search ENGINES are those search engines that are intended and designed not to take our searched data or BROWSING habits hence do not hampers our online privacy and users can use them for FREE. |
|
| 14. |
Which of the following is a private search engine?(a) Bing(b) Google(c) Duckduckgo(d) YahooThis question was posed to me by my school principal while I was bunking the class.This key question is from Cyber Security Privacy in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct answer is (c) Duckduckgo |
|
| 15. |
Which of the following is not a private search engine?(a) StartPage(b) Baidu(c) SearX.me(d) QwantThe question was posed to me in a national level competition.This key question is from Cyber Security Privacy topic in chapter Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right answer is (B) Baidu |
|
| 16. |
__________________ are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy.(a) Paid search engines(b) Incognito mode(c) In-private mode(d) Private search enginesThe question was posed to me in a national level competition.I need to ask this question from Cyber Security Privacy topic in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right answer is (d) Private search engines |
|
| 17. |
Which of the following is not a VPN used for preserving our anonymity?(a) Nord VPN(b) Express VPN(c) Microsoft Security Essential(d) CyberGhostI got this question during an interview for a job.This interesting question is from Cyber Security Privacy topic in chapter Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct choice is (C) Microsoft Security Essential |
|
| 18. |
Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices.(a) True(b) FalseThis question was posed to me in exam.The origin of the question is Cyber Security Privacy topic in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct choice is (a) True |
|
| 19. |
Which of the following is not an example of approaches for maintaining anonymity?(a) Use of VPNs(b) Use of Tor Browser(c) Use of Proxy servers(d) Use of AntivirusI had been asked this question in semester exam.I'd like to ask this question from Cyber Security Privacy topic in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right choice is (d) Use of Antivirus |
|
| 20. |
Which of the following is not an example of approaches for maintaining anonymity?(a) Using encrypted search engines that don’t share your search data(b) Use firewalls(c) Fake email services(d) Use file shieldersThe question was asked in an internship interview.Question is taken from Cyber Security Privacy topic in chapter Privacy in Cyber Security & Deep Web of Cyber Security |
| Answer» | |
| 21. |
Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers.(a) True(b) FalseThis question was addressed to me in semester exam.The query is from Cyber Security Privacy in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct choice is (a) True |
|
| 22. |
_________ services are examples of anonymity services that conceal the location and usage of any user.(a) Tor(b) Encrypted router(c) Firewall(d) HTTPSI got this question by my college professor while I was bunking the class.I need to ask this question from Cyber Security Privacy in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» CORRECT option is (a) TOR Explanation: Tor services are EXAMPLES of anonymity services that conceal the location and usage of any user. An anonymity network allows users for accessing the web while blocking the TRACKERS or agents that keep tracing the IDENTITY online. |
|
| 23. |
An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online.(a) intranet(b) extranet(c) complex network(d) anonymity networkI got this question in semester exam.The above asked question is from Cyber Security Privacy topic in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» CORRECT answer is (d) ANONYMITY network To explain I would say: An anonymity network allows users to access the web while blocking the trackers or agents that keep TRACKING the identity ONLINE. Some data are kept ANONYMOUS for maintaining privacy or protecting them from cyber-crimes like personal identity theft. |
|
| 24. |
Sometimes __________________ anonymize them to perform criminal activities.(a) virus(b) incident handlers(c) cyber-criminals(d) ethical hackersI have been asked this question in examination.My question comes from Cyber Security Privacy in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right ANSWER is (c) CYBER-criminals |
|
| 25. |
The term _____________ means taking care of a user’s name as well as the identity hidden or veiled using a variety of applications.(a) pseudonymous(b) anonymous(c) eponymous(d) homonymousThis question was posed to me by my college director while I was bunking the class.My question comes from Cyber Security Privacy in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct ANSWER is (b) anonymous |
|
| 26. |
___________________ is employed by encrypting the application layer with a communication protocol stack, nested in various layers of onion.(a) Privacy routing(b) Onion routing(c) Turbo routing(d) DHCP routingI have been asked this question in an online interview.This question is from Cyber Security Privacy in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right choice is (B) Onion routing |
|
| 27. |
Which of the following online services’ privacy cannot be protected using Tor?(a) Instant messaging(b) Browsing data(c) Relay chats(d) Login using IDThe question was posed to me during an online interview.My question is based upon Cyber Security Privacy topic in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right ANSWER is (d) Login using ID |
|
| 28. |
Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers etc.(a) True(b) FalseThe question was asked during an online exam.My question is from Cyber Security Privacy in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» The correct CHOICE is (a) True |
|
| 29. |
The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.(a) AnonyMode(b) Tor(c) Incognito mode(d) In-private modeThis question was addressed to me in semester exam.This interesting question is from Cyber Security Privacy topic in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right choice is (b) Tor |
|
| 30. |
__________ contains a huge proxy DB which users can use to protect their online privacy and preserve their identity online.(a) AnonyMode(b) In-private mode(c) Incognito mode(d) TorThe question was asked in an interview for job.My question is based upon Cyber Security Privacy in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right OPTION is (d) Tor |
|
| 31. |
Tor is written in ______ language having roughly 146,000 LOC (lines of code).(a) C#(b) C++(c) C(d) Objective CThe question was posed to me in an international level competition.Enquiry is from Cyber Security Privacy topic in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» The correct choice is (C) C |
|
| 32. |
Tor was originally designed for the _____________ for protecting government communications.(a) U.S. Navy(b) Indian Navy(c) US army(d) Chinese cyber armyI got this question in homework.I'd like to ask this question from Cyber Security Privacy in section Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct choice is (a) U.S. Navy |
|
| 33. |
Tor services are also popularly known as _____________(a) onion services(b) garlic services(c) privacy policy service(d) anti-surveillance serviceThe question was posed to me during an online interview.My question is from Cyber Security Privacy topic in chapter Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct choice is (a) onion services |
|
| 34. |
TOR stands for _______________(a) The Open Router(b) The Onion Reader(c) The Onion Router(d) Tactical Onion RouterThis question was addressed to me in class test.This is a very interesting question from Cyber Security Privacy in portion Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Correct ANSWER is (c) The Onion Router |
|
| 35. |
_____________ makes it likely for its users to hide their physical locations & offering a variety of services like web publishing or an IM maintaining privacy.(a) AnonyMode(b) In-private mode(c) Incognito mode(d) TorThis question was addressed to me by my college director while I was bunking the class.This interesting question is from Cyber Security Privacy in division Privacy in Cyber Security & Deep Web of Cyber Security |
|
Answer» Right answer is (d) TOR |
|