Question 1
What is the cycle of the iterative design process?
Question 2
What’s the difference between system centered design and user centered design
Question 3
Which of the following are NOT good ways to incorporate user-centered design in the design of security systems?
Question 4
When designing error messages, which are important factors to keep in mind for usability?
Question 5
If you were designing security for the entrance to a secure facility, which of the following should you consider?
Question 6
Which of the following are disadvantages of personas?
Question 7
Which of these are advantages of low-fidelity (e.g. paper) prototypes
Question 8
Which of the following are present in good interface design?
Question 9
Which of the following is NOT an important part of the design process
Question 10
In participatory design and co-design, which of the following is true
Week 6 Quiz Usable Privacy >>> Usable Security 1. Question 1 Which of these is not a guideline for usable privacy? 1 point Make privacy systems match users’ expectations from…
Week 5 Quiz Usable Authentication >>> Usable Security 1. Question 1 What type of attack would be most effective / fastest if the user’s password is “hello”? 1 point Dictionary…
Week 3 Quiz Evaluation of Usable Security 1. Question 1 What is the goal of A/B testing? 1 point To test users’ answers to quiz questions To allow users to…
Week 4 Quiz Guidelines for Usable Security >>> Usable Security 1. Question 1 What is the principle of least privilege? 1 point A system should be able to access only…
Final Exam of Usable Security 1. Question 1 Company ABC’s password policy has always been that the system generates passwords for its users instead of letting them pick their own….
Week 1 Quiz HCI Basics of Usable Security 1. Question 1 Imagine you are analyzing the usability of a banking website. Which of the following are examples of good tasks?…