Blockchain CBDH Practice Test - Questions Answers, Page 4
List of questions
Related questions
Question 31
In Hyperledger Fabric, there are three types of peer nodes depending upon the assigned roles.
What are three types? (Choose three.)
Explanation:
So not all peer nodes are same. There are different types of peer nodes with different roles in the network: Endorser peer Anchor peer Orderer peer Endorser peer Peers can be marked as Endorser peer (Endorsing peer). Upon receiving the “transaction invocation request” from the Client application the Endorser peer Validates the transaction. Check certificate details and roles of the requester. Executes the Chaincode (Smart Contract) and simulates the outcome of the transaction. But it does not update the ledger. At the end of the above two tasks the Endorser may approve to disapprove the transaction. As only the Endorser node executes the Chaincode (Smart Contract) so there is no necessity to install Chaincode in each and every node of the network which increases the scalibility of the network. Anchor peer Anchor peer or cluster of Anchor peers is configured at the time of Channel configuration. Just to remind you, in Hyperledger Fabric you can configure secret channels among the peers and transactions among the peers of that channel are visible only to them. Anchor peer receives updates and broadcasts the updates to the other peers in the organization. Anchor peers are discoverable. So any peer marked as Anchor peer can be discovered by the Orderer peer or any other peer. Orderer peer Orderer peer is considered as the central communication channel for the Hyperledger Fabric network. Orderer peer/node is responsible for consistent Ledger state accross the network. Orderer peer creates the block and delivers that to all the peers. Orderer is built on top of a message oriented architecture. There are two options are currently available to implement Orderer peer: Solo: Suitable for development. Single point failure. Solo should not be used for the production ready network. Kafka: Production ready Hyperledger Fabric network uses Kafka as the Orderer implementation. Kafka is a messaging software that has high throughput fault tolerant feature.
Question 32
What certificate is granted an "allocation" of transaction certificates to each user?
Explanation:
Each enrolled user is granted an allocation of transaction certificates (tCerts).
Reference: https://console.bluemix.net/docs/services/blockchain/reference/v10_fabric.html#hyperledger-fabric
Question 33
Chaincode with Hyperledger Fabric can be written in what development languages? Select All that apply.
Explanation:
Reference: https://hyperledger-fabric.readthedocs.io/en/release-1.3/chaincode.html
Question 34
The advantages of using Hyperledger Fabric include which of the following?
Explanation:
Hyperledger Fabric has a modular component structure and an extensible plug and play framework
Question 35
In regards to Fabric blockchain blocks. The structure of a "block header" consists of three sections when it is written. (Select three.)
Explanation:
Let’s have a closer look at the structure of a block. It consists of three sections Block Header This section comprises three fields, written when a block is created. Block number: An integer starting at 0 (the genesis block), and increased by 1 for every new block appended to the blockchain. Current Block Hash: The hash of all the transactions contained in the current block. Previous Block Hash: A copy of the hash from the previous block in the blockchain.
Reference: https://hyperledger-fabric.readthedocs.io/en/release-1.3/ledger/ledger.html
Question 36
Hyperledger blockchain frameworks reach consensus by performing two separate activities.
What are the two activities? (Select two.)
Explanation:
Hyperledger business blockchain frameworks reach consensus by performing two separate activities: 1. Ordering of transactions 2. Validating transactions by logically separating these activities, we ensure that any Hyperledger framework can work with any Hyperledger consensus module.
Reference: https://www.hyperledger.org/wp-content/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf
Question 37
All of the following are key terms in Cryptography EXCEPT?
Explanation:
Cryptography is used in Blockchain to address the issues and concerns of privacy. Cryptography is the study of how to send information back and forth securely in the presence of adversaries. A cryptographic function is a function for encoding or encrypting data to protect the contents from others. The following components are the basis of a cryptographic function: The Secret: The data which we are trying to protect The Key: A piece of data used for encrypting and decrypting the secret The Function: The process or function used to encrypt the secret The Cipher: The encrypted secret data, output of the function The Secret and the Key are passed into the Function to create a Cipher.
Question 38
The Hyperledger Project Framework of blockchains is meant for specific use cases for enterprise.
Which blockchain includes a novel consensus algorithm, Proof of Elapsed Time (PoET)?
Explanation:
Hyperledger Sawtooth is a modular platform for building, deploying, and running distributed ledgers. Hyperledger Sawtooth includes a novel consensus algorithm, Proof of Elapsed Time (PoET), which targets large distributed validator populations with minimal resource consumption.
Question 39
Which tool would you select to that would allow users to measure performance of a specific implementation with predefined use cases?
Explanation:
Caliper, a blockchain benchmark tool that allows users to measure performance of a specific implementation with predefined use cases, is in incubation status and was contributed by developers from numerous organizations.
Question 40
What component on the blockchain maintains the "world state"?
Explanation:
Distributed Ledger manages the world state and the transaction log in the blockchain. The world state is defined as the state of all transactions on the Blockchain, where all nodes agree that all blocks on the Blockchain are at the same state. It implements three key attributes. It efficiently calculates the cryptographic hash of the entire dataset of each block. It efficiently transmits a minimal “delta” changes to the dataset, when a peer is out of sync and needs to “catch up”. It minimizes the amount of stored data required for each peer to operate.
Question