Group10 Questionaire
Group10 Questionaire
2. Public Key Infrastructure (PKI) relies on trusted certificate authorities to authenticate public
keys.
4. Diffie-Hellman key exchange transmits the shared secret directly over the network.
Multiple-Choice Questions
6. Which of the following is NOT a use case for cryptographic hash functions?
a. Data integrity verification
b. Password storage
c. Encrypting data
d. Blockchain security
9. What cryptographic technique does Bitcoin use to link blocks in the blockchain?
a. RSA encryption
b. Zero-knowledge proofs
c. SHA-256 hashing
d. Diffie-Hellman
1. False
2. True
3. True
4. False
5. False
6. C
7. C
8. B
9. C
10. C