Module 4 Flashcards
The ______ is the restricted and unindexed portion of the internet.
Dark web
Sites on the surface web are:
Able to be indexed.
An IP address is NOT:
A) The numerical label assigned to an internet connected device.
B) Able to be used to connect to a network or locate the address.
C) The same for multiple devices.
D) Able to be geolocated.
The same for multiple devices.
The most popular way people access the dark web is through:
Tor
TAILS is similar to Tor because it:
Bounces your IP address across multiple nodes to prevent detection.
Which of the following is not true about a VPN?
A) It can be used to circumvent country restrictions on the internet.
B) It provides a temporary email address that deletes after a set time period.
C) It can limit your ISP’s ability to record your web usage.
D) It can advertise logless activity, but still keep a log.
B
A ______ marketplace is where the marketplace acts as a middleman, where a ________ marketplace is a peer-to-peer marketplace with limited marketplace involvement.
Centralized, decentralized
Which of the following is an example of a cold wallet?
Paper, Brain, or Hardware are examples
Which of the following is not a legitimate use of the dark web?
A) Whistleblowing
B) Law enforcement tip lines
C) Protecting trade secrets and intel
D) News agencies communicating with a confidential source
E) None of the above.
E
During an investigation, you should not consider:
A) Immediately exposing all details of the case and asking for the public’s help
B) Working with compliant locations
C) Partnering with intelligence agencies
D) Utilizing a blockchain explorer
A
When handling any type of wallet, have at least __ officers present, also known as _______, to maintain chain of custody.
2, dual control
Remaining up to date with the latest dark web technology and schemes can help you:
Communicate with your community
Identify emerging trends in criminal activity
Understand and speak to both pros and cons of the dark web
All of the above.
Legitimate reasons a business can use the dark web are (check all that apply):
Recruiting new talent, Protecting trade secrets
An average user may encounter danger on the dark web by (check all that apply):
Unintentionally clicking on a link that has illicit material.
Unintentionally downloading a file that contains malware.
Unknowingly purchase contraband through false listings or mystery boxes.
If given out, which of the following will give someone access to your wallet? Check all that apply.
Private key, QR code of the private key