Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 5
1. In cyber security, what is Mallory associated with:
Sixth participant (and so on alphabetically).
Malicious attacker; an active man-in-the-middle attacker who can modify messages, substitute their own messages, replay old messages.
A trusted arbitrator. Kind of neutral third party, whose exact role varies with the protocol under discussion.
A government representative. Tries to force Alice into implementing backdoors in protocols. May also deliberately weaken standards.