1. Which Sherlock Holmes story does not involve a cipher?
Answer: B. The Hound of the Baskervilles
Unsurprisingly Sherlock is a big fan of ciphers but in this story there is an acronym not a cipher
2. Which Edgar Allan Poe work involved steganography and cryptography?
Answer: C. The Golden Bug
Treasure, invisible ink and a cryptogram – great story which all starts with a man getting bitten by a bug!
3. Which company provided a Code-o-Graph to the listeners to the radio show Captain Midnight?
Answer: D. Ovaltine
Listeners to the exciting Captain Midnight radio show in the 1940s could decipher messages using the Code-o-Graph – and you could get one of those with an Ovaltine proof of purchase
4. Which native American Indian language was used during the 2nd World War to encrypt messages between the Allies?
Answer: A. Navajo
Navajo, as an unwritten language known to very few, was a perfect base for creating a code for the Allies
5. Which of these TV shows conceals substitution ciphers in its imagery?
Answer: B. Futurama
Watch carefully and spot the hidden code!
6. In cyber security, what does the acronym RAT stand for?
Answer: A. Remote Access Trojan
Yep, we made the other ones up.
7. How many community service hours did the subject get for committing cyber offences in the film ‘Don’t Cross the Line to Cyber Crime’ hosted on www.cyberchoices.uk?
Answer: D. 150 hours
8. According to the www.cyberchoices.uk website, what Computer Misuse Act 1990 offence is being committed by booting someone offline whilst playing online games (you may wish to check the Computer Misuse Act 1990 link)?
Answer: D. A Section 3 offence