Blockchain CBBF Practice Test - Questions Answers, Page 8
List of questions
Related questions
Blockchains are being implemented in the food supply chain because ____________.
A.
Consumers demand to know where their food comes from
B.
It allows farm to table accountability for safety
C.
They have the potential to provide fast, specific supplier data
D.
It prevents food waste if a food contamination problem occurs.
E.
All of the above
Who governs a Blockchain?
A.
The users
B.
The architects
C.
The creator of the Blockchain
D.
The developers
What do consensus methods achieve?
A.
Anonymity in a peer to peer network
B.
The highest level of security in a database by ensuring 51% agreement of nodes on the network.
C.
The most efficient way of recording a transaction in any database.
D.
It confirms that all nodes on the network are legitimate.
E.
None of the above
Where is a Blockchain's central server?
A.
Where the Blockchain is created
B.
Located with the owner of the server
C.
There is no central server, it is distributed
D.
Orderer Node
E.
None of the above
What is a private Blockchain used instead of a public one?
A.
It is less expensive to develop
B.
It requires less mining power that a public Blockchain
C.
To limit user access and permissions
D.
It requires fewer administrators to manage it
Cryptocurrencies have all the same characteristics as fiat currencies?
A.
True
B.
False
What is a block?
A.
A list or record of data
B.
A wallet that stores digital currency
C.
A pool of unconfirmed transactions
D.
A list or record of certificates
E.
All of the above
Why is Blockchain important?
A.
It allows for a secure, global, and peer to peer record of data
B.
It provides anonymity when making transactions
C.
It is a free, trusted bank
D.
It replaces all ledgers
E.
All of the above
Blockchain work best when they are _____________ .
A.
Combined with other technologies
B.
Used for financial applications
C.
Used alone
D.
Used as an alternative to a database
One of Blockchain's primary uses of cryptography is ___________.
A.
Keeping the IP addresses a secret
B.
Allowing users to communicate with each other anonymously
C.
Keeping the network configuration a secret.
D.
Providing a public and private encryption key
Question