Exam 8: An Evolving Threat: the Deep Web

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using the benefits of ToR presented , provide your own examples of "Who is using ToR?" and "Why?"

(Essay)
4.9/5
(39)

Compare and contrast the deep web and the dark web.

(Essay)
4.7/5
(26)

Dash eliminates this security issue by implementing a two-tier security network.

(True/False)
4.8/5
(41)

The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.

(Multiple Choice)
4.8/5
(44)

Which of the following is NOT considered a portal of the darknet?

(Multiple Choice)
4.7/5
(32)

Solving complex mathematical puzzles every 10 minutes is a task usually seen with ______.

(Multiple Choice)
4.9/5
(25)

______ was originally developed by the U.S. Naval Research Laboratory as a method of anonymous communication.

(Multiple Choice)
4.9/5
(34)

The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ______.

(Multiple Choice)
4.8/5
(38)

Identify and explain various types of cryptocurrency. What are some of the challenges associated with using this type of currency?

(Essay)
4.9/5
(38)

Surface webs make up a small part of the massive deep web and is where the majority of criminal activities on the deep web occur.

(True/False)
4.9/5
(33)

What is the Silk Road and why have law enforcement officials focused on dismantling it?

(Essay)
4.9/5
(37)

There are two main forms of darknets: peer-to-peer nets (used for filesharing) and large anonymous networks.

(True/False)
4.8/5
(42)

Google, Facebook, and any website you can find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located on the darknet.

(True/False)
4.9/5
(33)

According to the text, deep web sites can include all of the following except ______.

(Multiple Choice)
4.9/5
(38)

Which of the following was NOT identified in the text as an example of a research tool and database located on the deep web?

(Multiple Choice)
4.8/5
(33)

Explain why enforcing the darknet is an extremely difficult and time-consuming task.

(Essay)
4.9/5
(36)

Protection against unwarranted search and seizure is a constitutional protection given by the ______.

(Multiple Choice)
4.7/5
(40)

A network within a network that is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs is referred to as an anonymous overlay network.

(True/False)
4.8/5
(45)

According to the text, some of the most popular products advertised on the hidden wiki are ______.

(Multiple Choice)
4.8/5
(39)

On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.

(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)