Q: 10
In a country where the government tightly controls internet access, a cybersecurity analyst suspects
that sensitive communications are being monitored. To circumvent this surveillance, the analyst
decides to use the Tor network. However, accessing the Tor network directly is impossible due to
government restrictions. How can the cybersecurity analyst overcome government surveillance and
access the Tor network in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.