Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 5
1. In cyber security, what is Frank associated with:
A fifth participant.
Sixth participant (and so on alphabetically).
A government representative. Tries to force Alice into implementing backdoors in protocols. May also deliberately weaken standards.