Which of the following Tor relays is treated as suspected because it is perceived to be the origin of malicious traffic?

Study for the EC-Council Digital Forensics Essentials (DFE) Test. Enhance your skills with multiple choice questions, each with detailed hints and explanations. Get ready to ace your exam!

The correct choice is the exit relay, as this is the Tor relay that is the final point in the Tor network before the traffic reaches its ultimate destination outside of the Tor network. Since the exit relay is where the encrypted Tor traffic is decrypted, it is often the source of visibility for any traffic that is malicious or unwanted. As such, malicious activity can be traced back to the exit relay, which raises suspicions about the trustworthiness of that specific relay.

In contrast, entry relays are where users first connect to the Tor network, while middle relays simply pass traffic through the network without decrypting it. The guard relay, typically used as an entry point for users, also does not have visibility into the content of the traffic it is handling. Therefore, the exit relay is the one most closely scrutinized for potentially originating any malicious traffic due to its role in the network flow.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy