CSCUK

Well done for playing week 4 of the Spring Cyber Challenge, brought to you by NCA Cyber Choices.

How did you do? Check your answers here.

Remember, lucky prize winners will be contacted by email, so keep an eye on your inbox! Now, time to take on week 5…

1. Which Sherlock Holmes story does not involve a cipher?

Answer: B. The Hound of the Baskervilles

Unsurprisingly Sherlock is a big fan of ciphers but in this story there is an acronym not a cipher

2. Which Edgar Allan Poe work involved steganography and cryptography?

Answer: C. The Golden Bug 

Treasure, invisible ink and a cryptogram – great story which all starts with a man getting bitten by a bug!

3. Which company provided a Code-o-Graph to the listeners to the radio show Captain Midnight?

Answer: D. Ovaltine 

Listeners to the exciting Captain Midnight radio show in the 1940s could decipher messages using the Code-o-Graph  – and you could get one of those with an Ovaltine proof of purchase

4. Which native American Indian language was used during the 2nd World War to encrypt messages between the Allies?

Answer: A. Navajo

Navajo, as an unwritten language known to very few, was a perfect base for creating a code for the Allies

5. Which of these TV shows conceals substitution ciphers in its imagery?

Answer: B. Futurama

Watch carefully and spot the hidden code!

6. In cyber security, what does the acronym RAT stand for?

Answer: A. Remote Access Trojan

Yep, we made the other ones up.

7. How many community service hours did the subject get for committing cyber offences in the film ‘Don’t Cross the Line to Cyber Crime’ hosted on www.cyberchoices.uk?

Answer: D. 150 hours

8. According to the www.cyberchoices.uk website, what Computer Misuse Act 1990 offence is being committed by booting someone offline whilst playing online games (you may wish to check the Computer Misuse Act 1990 link)?

Answer: D. A Section 3 offence