RFC 7258 Quiz

Pervasive Monitoring Is an Attack

0 / 0

References (URLs)

Goal: translate a threat model statement into concrete protocol and deployment decisions.

Q1: Treating pervasive monitoring as an attack primarily means

Multiple Choice
**Explanation:** **Correct (B):** It is a threat model position, not a legal claim

Q2: Design choices that generally reduce exposure to pervasive monitoring include (select all)

Multi-Select
**Explanation:** **Correct (A,B,C):** The goal is to make passive observation less useful and harder to scale **Options:** - D (incorrect): That increases linkability

Q3: A common misunderstanding is that encryption

Multiple Choice
**Explanation:** **Correct (C):** Encryption helps, but many threats remain, including endpoint compromise and traffic analysis

Q4: Your protocol sends user identifiers in cleartext to allow caching. Under the RFC 7258 mindset, what is a reasonable next step

Multiple Choice
**Explanation:** **Correct (A):** Pervasive monitoring focuses on large scale correlation value of metadata

Q5: Which statement best captures the document's intent

Multiple Choice
**Explanation:** **Correct (B):** It frames PM as an attacker class to be considered

Q6: What kind of data can remain exposed and still enable large scale correlation even when payload is encrypted (one word)

Short Text
**Explanation:** **Correct:** metadata