Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 5
1. In cyber security, what is Frank associated with:
Sixth participant (and so on alphabetically).
Password cracker (usually encountered in situations with stored hashed/salted passwords).
Malicious attacker; an active man-in-the-middle attacker who can modify messages, substitute their own messages, replay old messages.
A trusted arbitrator. Kind of neutral third party, whose exact role varies with the protocol under discussion.