1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Two of the most popular forms of cryptocurrency are bitcoins and dogecoins
false
Google, Facebook, and any website you can find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located on the darknet.
false
On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.
bitcoins
Which of the following constitutional Amendments established the right to freedom of speech?
first
Dash eliminates this security issue by implementing a two-tier security network.
true
The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ______.
deep net
Sites on the ToR network end in ______, but if you were to type the web address into Google, the website would not be found.
.onion
Solving complex mathematical puzzles every 10 minutes is a task usually seen with ______.
mining
Which of the following sites was not identified as being one of the popular alternatives in the darknet?
Milky Way
As law enforcement is attempting to infiltrate darknet websites, the group Anonymous is working to restore darknet sites that have been taken down.
false
______ may use ToR for competitions, keeping strategies secret, and internal accountability.
businesses
The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.
eBay-type
______ is often referred to as a peer-to-peer platform for censorship-resistant communication and publishing.
Freenet
According to the text, the surface web only accounts for about ______ percent of all the Internet.
4
Protection against unwarranted search and seizure is a constitutional protection given by the ______.
Fourth Amendment
Two of the most popular forms of cryptocurrency are ______.
bitcoin and dash
Which of the following types of cryptocurrency claims to improve on bitcoins by offering n enhanced level of security?
dash
______ may use ToR to protect sources, resources, and report from areas where it is dangerous.
media
In order to access the deep web, special considerations are needed, including private URL addresses or, for some areas, specialized software.
true
On average, Google accesses ______ percent of the surface web.
16