Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 723 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 723
Topic #: 1
[All 312-49v10 Questions]

As a Computer Hacking Forensics Investigator, you are tasked with tracing a series of illegal transactions believed to originate from the dark web. You know the transactions were made using Tor, a browser providing anonymity. However, in an authoritarian country where the usage of the Tor network is restricted, the suspect is believed to be using an undisclosed Tor network feature to bypass these restrictions. What feature is likely being used in this scenario?

  • A. Exit Relay
  • B. Entry/Guard Relay
  • C. Tor Bridge Node
  • D. Middle Relay
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jingu_bingo
5 months, 3 weeks ago
Selected Answer: C
TOR relays are public; bridges are not.
upvoted 1 times
...
Elb
6 months ago
Selected Answer: C
The Tor relay nodes are publicly available in the directory list, but the bridge node is different from relay nodes. Bridge nodes are nodes that are not published or listed in the public directory of Tor nodes.
upvoted 1 times
...
Elb
7 months ago
C < https://community.torproject.org/relay/types-of-relays/#:~:text=Tor%20bridges%20are%20relays%20in,and%20governments%20to%20block%20them.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...