Calculating your score ...
Click your answer, then NEXT and END when you are done to find out how you got on!
1 of 5
1. In cyber security, what is Alice associated with:
A fifth participant.
A government representative. Tries to force Alice into implementing backdoors in protocols. May also deliberately weaken standards.
A trusted advisor, courier or intermediary.
Female normally used in a communication with Bob.