SaveClip
🛡️

Level 3 — Intermediate

20 questions · Pass: 16 correct

Question 1 of 20 0 / 20
1

How does DNS-based censorship prevent access to a blocked domain?

2

Why is IP-based blocking considered to have collateral damage?

3

Why does Server Name Indication (SNI) leak the destination domain despite HTTPS encryption?

4

What problem does Encrypted Client Hello (ECH) solve?

5

At what technical level is geo-blocking typically implemented?

6

Why do Content Delivery Networks (CDNs) make IP-based blocking unreliable?

7

What is a transparent proxy and how does it intercept traffic?

8

What is BGP and how can BGP-level interventions affect routing?

9

How does the trust model of Tor differ fundamentally from that of a typical VPN?

10

What is an exit node in the Tor network?

11

How do traffic correlation attacks work conceptually?

12

Why are VPN-over-Tor and Tor-over-VPN not equivalent in practice?

13

What specific threat does a VPN kill switch protect against?

14

What does forward secrecy guarantee for a VPN session?

15

Why do DNS leaks occur even when a VPN is active?

16

What is a WebRTC leak and how is it prevented?

17

What is the core operational difference between symmetric and asymmetric encryption?

18

What does a digital certificate prove and what does it NOT prove?

19

What is the role of Certificate Transparency logs?

20

What security guarantee does a perfect forward secrecy session key provide?