Internet Privacy Quiz: What Do You Know?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jcreamer
J
Jcreamer
Community Contributor
Quizzes Created: 7 | Total Attempts: 6,184
| Attempts: 1,238
SettingsSettings
Please wait...

    1/10 Questions
  • Every device on the internet has a unique identification number built into its hardware.  This is known as the:

    • MAC address
    • IP address
    • Public proxy
    • NIC numeral
Please wait...
About This Quiz

What do you know about internet privacy? In this day and era, many people find themselves using the internet for almost anything, and they put themselves open to a lot of threats such as identity theft and hacking. Are you safe when using the internet? Take this test and get to find out how to keep your private information safe. See more

Internet Privacy Quiz: What Do You Know? - Quiz

Questions and Answers
  • 2. 

    The "I" in "IP address" stands for:

    • Internet

    • International

    • Interpol

    • You, the user

    Correct Answer
    A. Internet
    Explanation
    The "I" in "IP address" stands for Internet. An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The Internet is a global network of interconnected computers and devices that allows communication and sharing of information between users worldwide. Therefore, the "I" in "IP address" refers to the Internet as it is the network where IP addresses are used.

    Rate this question:

  • 3. 

    The "P" in "IP address" stands for:

    • Protocol

    • Port

    • Proxy

    • Provider

    Correct Answer
    A. Protocol
    Explanation
    The "P" in "IP address" stands for Protocol. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The protocol refers to the set of rules and procedures that govern the transmission of data between devices on a network. Therefore, the "P" in "IP address" represents the protocol used for communication.

    Rate this question:

  • 4. 

    Using online tools, anyone can quickly track your IP address back to:

    • Your city and/or internet service provider.

    • Your home address and phone.

    • Your physical location within about 4 feet.

    • IP addresses cannot be tracked.

    Correct Answer
    A. Your city and/or internet service provider.
    Explanation
    The correct answer is "Your city and/or internet service provider." When someone tracks your IP address using online tools, they can determine the general location of your internet connection. This information includes the city where you are accessing the internet and the name of your internet service provider. However, they cannot obtain your specific home address, phone number, or physical location with high precision.

    Rate this question:

  • 5. 

    Internet service providers like LBUSD request and are given a range of IP addresses to use, which they may re-assign to their members for use as necessary.  To identify the device that was using a certain IP at a particular moment, service providers use:

    • Log files

    • A local area network

    • Proxy tapes

    • A domain controller

    Correct Answer
    A. Log files
    Explanation
    Service providers use log files to identify the device that was using a certain IP at a particular moment. Log files contain records of all the activities and connections made by devices on the network, including the IP addresses assigned to them. By analyzing the log files, service providers can track the usage of IP addresses and determine which device was using a specific IP address at a given time. This helps in troubleshooting network issues, monitoring network traffic, and ensuring security.

    Rate this question:

  • 6. 

    Which reason for wanting online anonymity is least good?

    • To play jokes on people.

    • To do charitable deeds.

    • To get counseling.

    • To report a crime.

    Correct Answer
    A. To play jokes on people.
    Explanation
    Wanting online anonymity to play jokes on people is the least good reason because it involves intentionally causing harm or distress to others for amusement. While online anonymity can be important for various legitimate reasons such as seeking counseling or reporting crimes, using it to play pranks or engage in malicious behavior goes against ethical considerations and can potentially harm others emotionally or psychologically.

    Rate this question:

  • 7. 

    One strategy for getting a degree of anonymity online is to use another computer programmed to  "go-between" between you and the party you are addressing.  Such a computer is called a:

    • Proxy

    • Zombie computer

    • Privacy node

    • Trojan horse

    Correct Answer
    A. Proxy
    Explanation
    A proxy is a computer that acts as an intermediary between the user and the destination server. By using a proxy, the user's IP address and other identifying information are masked, providing a degree of anonymity online. This allows the user to access websites and communicate with others without revealing their true identity. Therefore, a proxy is a suitable computer to use as a "go-between" to maintain anonymity while addressing a party online.

    Rate this question:

  • 8. 

    The easiest way for law enforcement to identify a person who is using a proxy server is:

    • Issue a subpoena for the proxy's log files.

    • Call up the police where the suspect lives.

    • Violate the suspect's Fifth Amendment rights.

    • Search for the suspect using Google Transparency Services.

    Correct Answer
    A. Issue a subpoena for the proxy's log files.
    Explanation
    The easiest way for law enforcement to identify a person who is using a proxy server is by issuing a subpoena for the proxy's log files. Proxy servers act as intermediaries between a user and the internet, masking the user's true IP address. By obtaining the log files from the proxy server, law enforcement can trace back the user's activities and identify their true identity. This method is a legal and commonly used approach in investigations to gather evidence and track down individuals who may be using proxy servers to hide their online activities.

    Rate this question:

  • 9. 

    Building on research by the U.S. Navy, civil liberties groups have created a network that enables relatively anonymous communications over the net.  Users who employ a special browser enjoy protection against identification even in countries where the government may forcibly access its servers. Maintenance of this network is largely funded by the:

    • U.S. Government

    • United Nations

    • American Civil Liberties Union

    • Internet Society

    Correct Answer
    A. U.S. Government
    Explanation
    The U.S. Government is the correct answer because the passage states that the network enabling anonymous communications is based on research by the U.S. Navy. It also mentions that the government may forcibly access the servers, indicating that the U.S. Government has control over the network. Additionally, the passage does not mention any involvement or funding from the United Nations, American Civil Liberties Union, or Internet Society.

    Rate this question:

  • 10. 

    This free, worldwide volunteer network was designed to enable online anonymity:

    • Tor

    • Arpanet

    • Skype

    • Jitsi

    Correct Answer
    A. Tor
    Explanation
    Tor is a free, worldwide volunteer network that was specifically designed to enable online anonymity. It allows users to browse the internet anonymously by routing their internet traffic through a series of encrypted relays, making it difficult to trace their online activities. Tor is widely used by individuals who wish to protect their privacy, bypass censorship, or access blocked websites. It has become a popular tool for activists, journalists, and individuals concerned about their online security.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 03, 2013
    Quiz Created by
    Jcreamer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.