How Much do you know about Cyber Security Quiz

On the VPN. You are NOT anonymous when using a VPN. The VPN provider knows your connection details.

That depends on the details of the situation. As a most simple example, If I'm using VPN which is in another country, it can be argued that I'm becoming anonymous with respect to my government, and I don't care if VPN provider somewhere outside my government access can still track me.
 
That depends on the details of the situation. As a most simple example, If I'm using VPN which is in another country, it can be argued that I'm becoming anonymous with respect to my government, and I don't care if VPN provider somewhere outside my government access can still track me.
I like to use VPN servers from countries that do not get along well with my country.
 
In this example, the first password would likely take longer to crack than the second password, by simple brute force methods at least, because it contains an extra character.
I would agree...into*49 takes about 22 seconds for a computer to crack, whereas WTh!5z would take 5 seconds to crack.
But into*48 contains a dictionary word and a two-digit number (year of birth?), separated by a random character. In other words, it follows a common password pattern. Password cracking is more sophisticated than trying a, b, cz, aa, ab

No arguments about the length of any of the choices – they're all much too short.

Oh, 10/10. ;)
 
That depends on the details of the situation. As a most simple example, If I'm using VPN which is in another country, it can be argued that I'm becoming anonymous with respect to my government, and I don't care if VPN provider somewhere outside my government access can still track me.

I like to use VPN servers from countries that do not get along well with my country.

Everything is relative. There is no real anonymity on the Internet so it's a question of who you want to hide your activities from. So, for most users, a VPN will work just fine keeping LAN's/ISP's from seeing traffic.

The real question is when someone's activities starts showing up on the wrong radar screen(s). Reading up on the Silk Road/Ross Ulbricht bust provides some interesting insights into the breadth and depth of what a nation state can do. Long before they had his name they knew that he had made some Silk Road forum posts from a coffee shop near his apartment in SF. This means that they had the ability to control/log traffic through Tor nodes.
 
TOR nodes are funny in the sense that you do not know how many of these are actually planted by various agencies. Designs like TOR are vulnerable to poisoning. I've looked at this https://metrics.torproject.org/networksize.html and there are 6000 relays, and I don't see any problem of planting additional 6000 any moment. I would say it is likely possible for an individual to take over the entire network given some money and some persistence.
 
10/10, was not very technical to be honest. It felt like one of those easy multiple choice standardized tests you had to take in school only shorter.
 
You answered 9 of 10 questions correctly.
Turning off the GPS function of your smartphone prevents any tracking of your phone’s location.

You answered True
The correct answer is False
 
9/10. The quiz creator seems to think that HTTPS means that "That information entered into the site is encrypted". Which is inaccurate of course - traffic is encrypted in transit but once entered into a website the website back end governs if the information entered is encrypted. Just goes to show that we shouldn't assume that these research bodies such as Pew experts at anything!
 
TOR nodes are funny in the sense that you do not know how many of these are actually planted by various agencies. Designs like TOR are vulnerable to poisoning. I've looked at this https://metrics.torproject.org/networksize.html and there are 6000 relays, and I don't see any problem of planting additional 6000 any moment. I would say it is likely possible for an individual to take over the entire network given some money and some persistence.

Yes. I can remember over the years that they reported suspicious nodes. Not sure how they ID'd them. And it looks like bridges, a certain type of relay might also come into play. The picture below is from 1/1/2016 to present. Notice the wild swings in that class.

tor-networksize-2016-01-01-2018-03-08.png
 
I got 9/10 because of their expanded definition of phishing. Also, this one is a bit ambiguous:

Cybersecurity_Knowledge_Quiz__Pew_Research_Center_2018-03-07_20-29-24.png


You could enter a password into a portal to gain access to an unencrypted WiFi network. Or you could enter a "password" aka encryption key to join a WPA2 network. If the former that is certainly less secure. But either way, how would using either for online banking be insecure in that situation?

There is not a single bank website that doesn't use SSL (that I know of). So all traffic between the browser and the server is secure. Are there man in the middle attacks that make that insecure? How else is that insecure?
 
Back
Top