Privacy and Deep Web All MCQ part-2

Que.The term _____________ means taking care of a user’s name as well as the identity hidden or veiled using a variety of applications.
a. pseudonymous
b. anonymous
c. eponymous
d. homonymous
Que.Sometimes __________________ anonymize them to perform criminal activities.
a. virus
b. incident handlers
c. cyber-criminals
d. ethical hackers
Que.An _______________ allows users for accessing the web while blocking the trackers or agents that keep tracing the identity online.
a. intranet
b. extranet
c. complex network
d. anonymity network
Que._________ services are examples of anonymity services that conceal the location and usage of any user.
a. Tor
b. Encrypted router
c. Firewall
d. HTTPS
Que.Another anonymity network is the I2P identity-sensitive network which gets distributed & is dynamic in nature as they route traffic through other peers.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not an example of approaches for maintaining anonymity?
a. Use of VPNs
b. Use of Tor Browser
c. Use of Proxy servers
d. Use of Antivirus
Que.Big multinational companies are providing us with search engines to easily search for data for free. But they are also taking our searched data and browsing habits as well as choices.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not a VPN used for preserving our anonymity?
a. Nord VPN
b. Express VPN
c. Microsoft Security Essential
d. CyberGhost
Que.__________________ are those search engines that are intended and designed not to take our searched data or browsing habits hence do not hampers our online privacy.
a. Paid search engines
b. Incognito mode
c. In-private mode
d. Private search engines
Que.Which of the following is a private search engine?
a. Bing
b. Google
c. Duckduckgo
d. Yahoo