Exam 8: An Evolving Threat: the Deep Web
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
According to the text, the surface web only accounts for about ______ percent of all the Internet.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
D
Surface websites use ______ to browse the web in a systematic and automated manner.
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
B
Which of the following constitutional Amendments established the right to freedom of speech?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
A
In order to access the deep web, special considerations are needed, including private URL addresses or, for some areas, specialized software.
(True/False)
4.8/5
(36)
On average, Google accesses ______ percent of the surface web.
(Multiple Choice)
4.7/5
(32)
Which of the following sites was not identified as being one of the popular alternatives in the darknet?
(Multiple Choice)
4.9/5
(33)
Existing only in the digital arena, ______ is/are the only way that purchases on the deep web can be made in anonymity.
(Multiple Choice)
4.8/5
(29)
The surface web, which is available via regular search engines, is hosted by all of the following browsers except ______.
(Multiple Choice)
4.8/5
(36)
______ is often referred to as a peer-to-peer platform for censorship-resistant communication and publishing.
(Multiple Choice)
4.8/5
(26)
The hidden wiki is a popular way to search the darknets. It acts as a search engine for illicit goods, products, and services.
(True/False)
4.9/5
(38)
Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.
(Multiple Choice)
4.9/5
(43)
______ may use ToR to protect sources, resources, and report from areas where it is dangerous.
(Multiple Choice)
4.8/5
(35)
On November 6, 2014, law enforcement collaborating together and coordinated via Europol took down multiple darknet drug marketplaces, including Silk Road 2.0, in an operation referred to as ______.
(Multiple Choice)
4.8/5
(36)
______ may use ToR for competitions, keeping strategies secret, and internal accountability.
(Multiple Choice)
4.9/5
(38)
Which of the following types of cryptocurrency claims to improve on bitcoins by offering n enhanced level of security?
(Multiple Choice)
4.7/5
(36)
Two of the most popular forms of cryptocurrency are bitcoins and dogecoins.
(True/False)
4.9/5
(37)
The surface web is often compared to the tip of the iceberg of the Internet, as the deep web is ______ bigger than the surface web.
(Multiple Choice)
4.8/5
(43)
As law enforcement is attempting to infiltrate darknet websites, the group Anonymous is working to restore darknet sites that have been taken down.
(True/False)
4.7/5
(45)
Activists may utilize ToR to protect communications, investigations, and intelligence.
(True/False)
4.7/5
(44)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)