0% found this document useful (0 votes)
5 views

Group10 Questionaire

Uploaded by

spnpart1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Group10 Questionaire

Uploaded by

spnpart1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

True or False Questions

1. AES is an example of asymmetric encryption.

2. Public Key Infrastructure (PKI) relies on trusted certificate authorities to authenticate public
keys.

3. SHA-256 is commonly used in blockchain to secure and verify transactions.

4. Diffie-Hellman key exchange transmits the shared secret directly over the network.

5. Post-quantum cryptography aims to create encryption methods vulnerable to quantum


computers.

Multiple-Choice Questions

6. Which of the following is NOT a use case for cryptographic hash functions?
a. Data integrity verification
b. Password storage
c. Encrypting data
d. Blockchain security

7. Which protocol is commonly used for secure browsing via HTTPS?


a. RSA
b. Diffie-Hellman
c. TLS
d. SHA-256

8. What does a digital signature ensure?


a. Confidentiality
b. Integrity and authenticity
c. Anonymity
d. Faster encryption

9. What cryptographic technique does Bitcoin use to link blocks in the blockchain?
a. RSA encryption
b. Zero-knowledge proofs
c. SHA-256 hashing
d. Diffie-Hellman

10. Which of the following is an example of a quantum-resistant cryptographic method?


a. RSA
b. Elliptic Curve Cryptography (ECC)
c. Lattice-based cryptography
d. AES
ANSWERS

1. False

2. True

3. True

4. False

5. False

6. C

7. C

8. B

9. C

10. C

You might also like