Usable Security Week 2 Quiz Answer
By University Of Maryland
About this Course
This course focuses on how to design and build secure systems with a
human-centric focus. We will look at basic principles of
human-computer interaction, and apply these insights to the design of
secure systems with the goal of developing security measures that
respect human performance and their goals within a system.
About this Course
This course focuses on how to design and build secure systems with a
human-centric focus. We will look at basic principles of
human-computer interaction, and apply these insights to the design of
secure systems with the goal of developing security measures that
respect human performance and their goals within a system.
Week 2 Quiz Answer
Q1) What is the cycle of the iterative design process?
- Requirements - Design - Development - Testing
- Design - Analysis - Coding - Testing
- Requirements - Development - Release
- Design - Analysis - Testing - Refinement
Q2) What's the difference between system centered design and user centered design
- System centered design focuses on developing systems while user centered sign focuses on developing user tasks.
- System centered design is about analyzing systems but user centered design is about analyzing users
- System centered design is focused on what is easy to build on a platform while user centered design is focused on user needs and context
Q3) Which of the folluuing are NOT good ways to incorporate user•centered design in the design of security systems?
- Designing security around user tasks
- Designing security based on what experts believe is best.
- Designing security based on the userX environment and work context
Q4) When designing error messages, which are important factors to keep in mind for usability?
- Force users to approve security exceptions
- Make the most secure options part of the user's natural task
- Use technical terms to fully explain the message to users
- Use language that users will understand
- Provide users with clear exits to get out of a security warning
Q5) If you were designing security for the entrance to a secure
facility', which of the following should you consider?
- What tasks the users are in the middle of when they need to access the area.
- What programming libraries are easy to use and freely available
- Which algorithms are most efficient
- How often users enter and exit
Q6) Which of the following are disadvantages of personas?
- They make potential users too "real" for designers
- They are expensive and time-consuming to create
- All team members work with a consistent model of users
- Too many personas can be difficult to create and manage.
- A diverse audience may be difficult to represent with a normal-sized set of personas
Q7) Which of these are advantages of low-fidelity (e.g. paper)
prototypes
- They can be created quickly and cheaply
- Am,' team member can create one, regardless of programming skills
- They let designers see the impact of font size, color, and other visual elements
- They can be used to calculate how long it will take users to accomplish certain tasks
Q8) Which of the following are present in good interface design?
- Easy to recover from errors
- Relies on common interaction techniques for familiarity
- Minimal training needed for a person to use the system
- Encryption of all data transmitted on a network
Q9) Which of the following is NOT an important part of the design
process
- Prepare a prototype
- Consider usability guidelines
- Solicit user input
- Compute the efficiency of the underlying algorithms
Q10) In participatory design and co-design, which of the following is
true
- Average users have equal standing with designers
- Managers convey input from users to designers
- Users design the system on their own based on a list of constraints provided by designers
- Designers brainstorm and create prototypes after asking potential users questions
-----------------------------------------------------------------------------------------------------------------------------------
Usable Security
-----------------------------------------------------------------------------------------------------------------------------------
0 Comments