Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 5
1. In cyber security, what is Chuck associated with:
A government representative. Tries to force Alice into implementing backdoors in protocols. May also deliberately weaken standards.
Female normally used in a communication with Bob.
Third participant usually of malicious intent.
A whistleblower, is an insider with privileged access who may be in a position to divulge the information.