1.
Every device on the internet has a unique identification number built into its hardware. This is known as the:
Correct Answer
A. MAC address
Explanation
The MAC address, or Media Access Control address, is a unique identification number assigned to every device connected to a network. It is built into the hardware of the device and is used to identify and communicate with other devices on the same network. Unlike an IP address, which can change, the MAC address remains constant for the lifetime of the device. Public proxy and NIC numeral are not correct options as they are not related to the unique identification number of a device on the internet.
2.
The "I" in "IP address" stands for:
Correct Answer
A. Internet
Explanation
The "I" in "IP address" stands for Internet. An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The Internet is a global network of interconnected computers and devices that allows communication and sharing of information between users worldwide. Therefore, the "I" in "IP address" refers to the Internet as it is the network where IP addresses are used.
3.
The "P" in "IP address" stands for:
Correct Answer
A. Protocol
Explanation
The "P" in "IP address" stands for Protocol. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The protocol refers to the set of rules and procedures that govern the transmission of data between devices on a network. Therefore, the "P" in "IP address" represents the protocol used for communication.
4.
Using online tools, anyone can quickly track your IP address back to:
Correct Answer
A. Your city and/or internet service provider.
Explanation
The correct answer is "Your city and/or internet service provider." When someone tracks your IP address using online tools, they can determine the general location of your internet connection. This information includes the city where you are accessing the internet and the name of your internet service provider. However, they cannot obtain your specific home address, phone number, or physical location with high precision.
5.
Internet service providers like LBUSD request and are given a range of IP addresses to use, which they may re-assign to their members for use as necessary. To identify the device that was using a certain IP at a particular moment, service providers use:
Correct Answer
A. Log files
Explanation
Service providers use log files to identify the device that was using a certain IP at a particular moment. Log files contain records of all the activities and connections made by devices on the network, including the IP addresses assigned to them. By analyzing the log files, service providers can track the usage of IP addresses and determine which device was using a specific IP address at a given time. This helps in troubleshooting network issues, monitoring network traffic, and ensuring security.
6.
Which reason for wanting online anonymity is least good?
Correct Answer
A. To play jokes on people.
Explanation
Wanting online anonymity to play jokes on people is the least good reason because it involves intentionally causing harm or distress to others for amusement. While online anonymity can be important for various legitimate reasons such as seeking counseling or reporting crimes, using it to play pranks or engage in malicious behavior goes against ethical considerations and can potentially harm others emotionally or psychologically.
7.
One strategy for getting a degree of anonymity online is to use another computer programmed to "go-between" between you and the party you are addressing. Such a computer is called a:
Correct Answer
A. Proxy
Explanation
A proxy is a computer that acts as an intermediary between the user and the destination server. By using a proxy, the user's IP address and other identifying information are masked, providing a degree of anonymity online. This allows the user to access websites and communicate with others without revealing their true identity. Therefore, a proxy is a suitable computer to use as a "go-between" to maintain anonymity while addressing a party online.
8.
The easiest way for law enforcement to identify a person who is using a proxy server is:
Correct Answer
A. Issue a subpoena for the proxy's log files.
Explanation
The easiest way for law enforcement to identify a person who is using a proxy server is by issuing a subpoena for the proxy's log files. Proxy servers act as intermediaries between a user and the internet, masking the user's true IP address. By obtaining the log files from the proxy server, law enforcement can trace back the user's activities and identify their true identity. This method is a legal and commonly used approach in investigations to gather evidence and track down individuals who may be using proxy servers to hide their online activities.
9.
Building on research by the U.S. Navy, civil liberties groups have created a network that enables relatively anonymous communications over the net. Users who employ a special browser enjoy protection against identification even in countries where the government may forcibly access its servers. Maintenance of this network is largely funded by the:
Correct Answer
A. U.S. Government
Explanation
The U.S. Government is the correct answer because the passage states that the network enabling anonymous communications is based on research by the U.S. Navy. It also mentions that the government may forcibly access the servers, indicating that the U.S. Government has control over the network. Additionally, the passage does not mention any involvement or funding from the United Nations, American Civil Liberties Union, or Internet Society.
10.
This free, worldwide volunteer network was designed to enable online anonymity:
Correct Answer
A. Tor
Explanation
Tor is a free, worldwide volunteer network that was specifically designed to enable online anonymity. It allows users to browse the internet anonymously by routing their internet traffic through a series of encrypted relays, making it difficult to trace their online activities. Tor is widely used by individuals who wish to protect their privacy, bypass censorship, or access blocked websites. It has become a popular tool for activists, journalists, and individuals concerned about their online security.