Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 5
1. In cyber security, what is Alice associated with:
Female normally used in a communication with Bob.
A trusted arbitrator. Kind of neutral third party, whose exact role varies with the protocol under discussion.
A fifth participant.
Password cracker (usually encountered in situations with stored hashed/salted passwords).