You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: tests/cybermetric/test_cybermetric.py
+12-5Lines changed: 12 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,10 @@
17
17
EXAMPLE_QUESTION= {
18
18
"question": "What is the primary requirement for an Random Bit Generator's (RBG) output to be used for generating cryptographic keys?",
19
19
"answers": {
20
-
"A": "The RBG's output should have a length that matches the target data to be protected.",
21
-
"B": "The RBG's output should be computationally indistinguishable from random bits and provide sufficient entropy to support the security strength required for the target data.",
22
-
"C": "The RBG's output should be as long as possible to ensure maximal randomness.",
23
-
"D": "The RBG's output should have precisely the same length as the symmetric key to be generated.",
20
+
"A": "The RBG's output should have a length that matches the target data to be protected",
21
+
"B": "The RBG's output should be computationally indistinguishable from random bits and provide sufficient entropy to support the security strength required for the target data",
22
+
"C": "The RBG's output should be as long as possible to ensure maximal randomness",
23
+
"D": "The RBG's output should have precisely the same length as the symmetric key to be generated",
24
24
},
25
25
"solution": "B",
26
26
}
@@ -34,17 +34,24 @@ def test_record_to_sample():
34
34
# Assert Sample is populated accurately with correct types
expected_input="""Question: What is the primary requirement for an Random Bit Generator's (RBG) output to be used for generating cryptographic keys?
51
+
Options: A) The RBG's output should have a length that matches the target data to be protected, B) The RBG's output should be computationally indistinguishable from random bits and provide sufficient entropy to support the security strength required for the target data, C) The RBG's output should be as long as possible to ensure maximal randomness, D) The RBG's output should have precisely the same length as the symmetric key to be generated
0 commit comments