Internet Privacy Quiz: What Do You Know?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jcreamer
J
Jcreamer
Community Contributor
Quizzes Created: 7 | Total Attempts: 6,131
Questions: 10 | Attempts: 1,203

SettingsSettingsSettings
Internet Privacy Quiz: What Do You Know? - Quiz

What do you know about internet privacy? In this day and era, many people find themselves using the internet for almost anything, and they put themselves open to a lot of threats such as identity theft and hacking. Are you safe when using the internet? Take this test and get to find out how to keep your private information safe.


Questions and Answers
  • 1. 

    Every device on the internet has a unique identification number built into its hardware.  This is known as the:

    • A.

      MAC address

    • B.

      IP address

    • C.

      Public proxy

    • D.

      NIC numeral

    Correct Answer
    A. MAC address
    Explanation
    The MAC address, or Media Access Control address, is a unique identification number assigned to every device connected to a network. It is built into the hardware of the device and is used to identify and communicate with other devices on the same network. Unlike an IP address, which can change, the MAC address remains constant for the lifetime of the device. Public proxy and NIC numeral are not correct options as they are not related to the unique identification number of a device on the internet.

    Rate this question:

  • 2. 

    The "I" in "IP address" stands for:

    • A.

      Internet

    • B.

      International

    • C.

      Interpol

    • D.

      You, the user

    Correct Answer
    A. Internet
    Explanation
    The "I" in "IP address" stands for Internet. An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The Internet is a global network of interconnected computers and devices that allows communication and sharing of information between users worldwide. Therefore, the "I" in "IP address" refers to the Internet as it is the network where IP addresses are used.

    Rate this question:

  • 3. 

    The "P" in "IP address" stands for:

    • A.

      Protocol

    • B.

      Port

    • C.

      Proxy

    • D.

      Provider

    Correct Answer
    A. Protocol
    Explanation
    The "P" in "IP address" stands for Protocol. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The protocol refers to the set of rules and procedures that govern the transmission of data between devices on a network. Therefore, the "P" in "IP address" represents the protocol used for communication.

    Rate this question:

  • 4. 

    Using online tools, anyone can quickly track your IP address back to:

    • A.

      Your city and/or internet service provider.

    • B.

      Your home address and phone.

    • C.

      Your physical location within about 4 feet.

    • D.

      IP addresses cannot be tracked.

    Correct Answer
    A. Your city and/or internet service provider.
    Explanation
    The correct answer is "Your city and/or internet service provider." When someone tracks your IP address using online tools, they can determine the general location of your internet connection. This information includes the city where you are accessing the internet and the name of your internet service provider. However, they cannot obtain your specific home address, phone number, or physical location with high precision.

    Rate this question:

  • 5. 

    Internet service providers like LBUSD request and are given a range of IP addresses to use, which they may re-assign to their members for use as necessary.  To identify the device that was using a certain IP at a particular moment, service providers use:

    • A.

      Log files

    • B.

      A local area network

    • C.

      Proxy tapes

    • D.

      A domain controller

    Correct Answer
    A. Log files
    Explanation
    Service providers use log files to identify the device that was using a certain IP at a particular moment. Log files contain records of all the activities and connections made by devices on the network, including the IP addresses assigned to them. By analyzing the log files, service providers can track the usage of IP addresses and determine which device was using a specific IP address at a given time. This helps in troubleshooting network issues, monitoring network traffic, and ensuring security.

    Rate this question:

  • 6. 

    Which reason for wanting online anonymity is least good?

    • A.

      To play jokes on people.

    • B.

      To do charitable deeds.

    • C.

      To get counseling.

    • D.

      To report a crime.

    Correct Answer
    A. To play jokes on people.
    Explanation
    Wanting online anonymity to play jokes on people is the least good reason because it involves intentionally causing harm or distress to others for amusement. While online anonymity can be important for various legitimate reasons such as seeking counseling or reporting crimes, using it to play pranks or engage in malicious behavior goes against ethical considerations and can potentially harm others emotionally or psychologically.

    Rate this question:

  • 7. 

    One strategy for getting a degree of anonymity online is to use another computer programmed to  "go-between" between you and the party you are addressing.  Such a computer is called a:

    • A.

      Proxy

    • B.

      Zombie computer

    • C.

      Privacy node

    • D.

      Trojan horse

    Correct Answer
    A. Proxy
    Explanation
    A proxy is a computer that acts as an intermediary between the user and the destination server. By using a proxy, the user's IP address and other identifying information are masked, providing a degree of anonymity online. This allows the user to access websites and communicate with others without revealing their true identity. Therefore, a proxy is a suitable computer to use as a "go-between" to maintain anonymity while addressing a party online.

    Rate this question:

  • 8. 

    The easiest way for law enforcement to identify a person who is using a proxy server is:

    • A.

      Issue a subpoena for the proxy's log files.

    • B.

      Call up the police where the suspect lives.

    • C.

      Violate the suspect's Fifth Amendment rights.

    • D.

      Search for the suspect using Google Transparency Services.

    Correct Answer
    A. Issue a subpoena for the proxy's log files.
    Explanation
    The easiest way for law enforcement to identify a person who is using a proxy server is by issuing a subpoena for the proxy's log files. Proxy servers act as intermediaries between a user and the internet, masking the user's true IP address. By obtaining the log files from the proxy server, law enforcement can trace back the user's activities and identify their true identity. This method is a legal and commonly used approach in investigations to gather evidence and track down individuals who may be using proxy servers to hide their online activities.

    Rate this question:

  • 9. 

    Building on research by the U.S. Navy, civil liberties groups have created a network that enables relatively anonymous communications over the net.  Users who employ a special browser enjoy protection against identification even in countries where the government may forcibly access its servers. Maintenance of this network is largely funded by the:

    • A.

      U.S. Government

    • B.

      United Nations

    • C.

      American Civil Liberties Union

    • D.

      Internet Society

    Correct Answer
    A. U.S. Government
    Explanation
    The U.S. Government is the correct answer because the passage states that the network enabling anonymous communications is based on research by the U.S. Navy. It also mentions that the government may forcibly access the servers, indicating that the U.S. Government has control over the network. Additionally, the passage does not mention any involvement or funding from the United Nations, American Civil Liberties Union, or Internet Society.

    Rate this question:

  • 10. 

    This free, worldwide volunteer network was designed to enable online anonymity:

    • A.

      Tor

    • B.

      Arpanet

    • C.

      Skype

    • D.

      Jitsi

    Correct Answer
    A. Tor
    Explanation
    Tor is a free, worldwide volunteer network that was specifically designed to enable online anonymity. It allows users to browse the internet anonymously by routing their internet traffic through a series of encrypted relays, making it difficult to trace their online activities. Tor is widely used by individuals who wish to protect their privacy, bypass censorship, or access blocked websites. It has become a popular tool for activists, journalists, and individuals concerned about their online security.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 03, 2013
    Quiz Created by
    Jcreamer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.