What Do You Know About Internet Privacy?

10 Questions

Settings
Please wait...
What Do You Know About Internet Privacy?

What do you know about internet privacy? In this day and era, a lot of people find themselves using the internet for almost anything, and they put themselves open to a lot of threats such as identity theft and hacking. Are you safe when using the internet? Take this test and get to find out how to keep your private information safe.


Questions and Answers
  • 1. 
    Every device on the internet has a unique identification number built into its hardware.  This is known as the:
    • A. 

      MAC address

    • B. 

      IP address

    • C. 

      Public proxy

    • D. 

      NIC numeral

  • 2. 
    The "I" in "IP address" stands for:
    • A. 

      Internet

    • B. 

      International

    • C. 

      Interpol

    • D. 

      You, the user

  • 3. 
    The "P" in "IP address" stands for:
    • A. 

      Protocol

    • B. 

      Port

    • C. 

      Proxy

    • D. 

      Provider

  • 4. 
    Using online tools, anyone can quickly track your IP address back to:
    • A. 

      Your city and/or internet service provider.

    • B. 

      Your home address and phone.

    • C. 

      Your physical location within about 4 feet.

    • D. 

      IP addresses cannot be tracked.

  • 5. 
    Internet service providers like LBUSD request and are given a range of IP addresses to use, which they may re-assign to their members for use as necessary.  To identify the device that was using a certain IP at a particular moment, service providers use:
    • A. 

      Log files

    • B. 

      A local area network

    • C. 

      Proxy tapes

    • D. 

      A domain controller

  • 6. 
    Which reason for wanting online anonymity is least good?
    • A. 

      To play jokes on people.

    • B. 

      To do charitable deeds.

    • C. 

      To get counseling.

    • D. 

      To report a crime.

  • 7. 
    One strategy for getting a degree of anonymity online is to use another computer programmed to  "go between" between you and the party you are addressing.  Such a computer is called a:
    • A. 

      Proxy

    • B. 

      Zombie computer

    • C. 

      Privacy node

    • D. 

      Trojan horse

  • 8. 
    The easiest way for law enforcement to identify a person who is using a proxy server is:
    • A. 

      Issue a subpoena for the proxy's log files.

    • B. 

      Call up the police where the suspect lives.

    • C. 

      Violate the suspect's Fifth Amendment rights.

    • D. 

      Search for the suspect using Google Transparency Services.

  • 9. 
    Building on research by the U.S. Navy, civil liberties groups have created a network that enables relatively anonymous communications over the net.  Users who employ a special browser enjoy protection against identification even in countries where the government may forcibly access its servers. Maintenance of this network is largely funded by the:
    • A. 

      U.S. Government

    • B. 

      United Nations

    • C. 

      American Civil Liberties Union

    • D. 

      Internet Society

  • 10. 
    This free, worldwide volunteer network was designed to enable online anonymity:
    • A. 

      Tor

    • B. 

      Arpanet

    • C. 

      Skype

    • D. 

      Jitsi