Question 1
What is the principle of least privilege?
Question 2
Which of the following is not a guideline for creating usable security systems?
Question 3
Which of the following is a good guideline about showing detail to users?
Question 4
If you are warning users about a security problem that has been detected, which is the best message to show them?
Question 5
In a system where a person can grant authority to others to his or her own access resources, which of the following is true?
Question 6
True or False: A design guideline for creating usable secure systems is to make the most secure way to complete a task the easiest way to complete the task.
Question 7
For an average user, which of the following is the most usable way to set file permissions?
Question 8
Which guideline is violated when an interface does not make capitalization differences unambiguous (e.g. a lower case “L” and capital “i” appear to be the same thing)
Question 9
True or false: Users should be aware of what authority they hold, what authority they have granted, and what the implications are for security decisions
Question 10
Which of the following is true?
Week 6 Quiz Usable Privacy >>> Usable Security 1. Question 1 Which of these is not a guideline for usable privacy? 1 point Make privacy systems match users’ expectations from…
Week 3 Quiz Evaluation of Usable Security 1. Question 1 What is the goal of A/B testing? 1 point To test users’ answers to quiz questions To allow users to…
Week 2 Quiz Design of Usable Security 1. Question 1 What is the cycle of the iterative design process? 1 point Requirements – Design – Development – Testing Design –…
Week 1 Quiz HCI Basics of Usable Security 1. Question 1 Imagine you are analyzing the usability of a banking website. Which of the following are examples of good tasks?…
Final Exam of Usable Security 1. Question 1 Company ABC’s password policy has always been that the system generates passwords for its users instead of letting them pick their own….
Week 5 Quiz Usable Authentication >>> Usable Security 1. Question 1 What type of attack would be most effective / fastest if the user’s password is “hello”? 1 point Dictionary…