ExamGecko
Home / Blockchain / CBSA / List of questions
Ask Question

Blockchain CBSA Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).

256
256
128
128
32
32
20
20
Suggested answer: D
Explanation:

SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.

Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting

asked 16/09/2024
Justin Kim
37 questions

Question 2

Report Export Collapse

What type of attack would be considered a very large flaw in public blockchains such as Bitcoin's Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

51% Attacks
51% Attacks
Tether Token Hack
Tether Token Hack
DDoS Attack
DDoS Attack
BIP attack
BIP attack
Parity Wallet Attack
Parity Wallet Attack
Suggested answer: A
Explanation:

Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/

asked 16/09/2024
Arnaldo Martinez 2-30793
42 questions

Question 3

Report Export Collapse

How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)

1,000,000,000,000,000,000
1,000,000,000,000,000,000
1,000,000,000,000,000
1,000,000,000,000,000
1,000,000,000
1,000,000,000
10,000
10,000
1,000,000,000,000
1,000,000,000,000
Suggested answer: A, B
Explanation:

Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html

asked 16/09/2024
Maria Gervasi
37 questions

Question 4

Report Export Collapse

In the Proof of Stake(POS) algorithm the miners are really known as ___________?

Notary
Notary
Oracle
Oracle
Forgers
Forgers
Minters
Minters
Suggested answer: C
Explanation:

Proof of Stake has the same goal as proof of work"”to validate transactions and achieve consensus in the chain"”and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum cofounder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.

Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read

asked 16/09/2024
MM rahn
41 questions

Question 5

Report Export Collapse

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________. What is required?

Consensus
Consensus
Crypthography
Crypthography
Bandwidth
Bandwidth
Availability
Availability
Suggested answer: A
Explanation:

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. Reference: https://en.wikipedia.org/wiki/ Byzantine_fault_tolerance

asked 16/09/2024
ATHANASIOS PAPALEXIOU
36 questions

Question 6

Report Export Collapse

A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

Stream
Stream
Block
Block
Parallel
Parallel
RSA
RSA
Suggested answer: A
Explanation:

Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

asked 16/09/2024
Stefan Finke
41 questions

Question 7

Report Export Collapse

You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin. What is Etherscan used for?

A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Bitcoin Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Bitcoin Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum and Tokens Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum and Tokens Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on any Blockchain
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on any Blockchain
Suggested answer: A
Explanation:

A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum Blockchain

Reference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-

asked 16/09/2024
Brian Kryszewski
33 questions

Question 8

Report Export Collapse

What are two challenges with using a Proof of Work algorithm? (Select two.)

Mining pools not allowed
Mining pools not allowed
Difficulty rate goes done every year.
Difficulty rate goes done every year.
Expensive
Expensive
Power Intensive
Power Intensive
Suggested answer: C, D
Explanation:

Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read

asked 16/09/2024
Janson Chong
26 questions

Question 9

Report Export Collapse

Your customer is an enterprise that is focused on financial sectors. What type of blockchain would this customer likely want specified for their enterprise?

Permissionless
Permissionless
Decentralized
Decentralized
Hybrid
Hybrid
Permissioned
Permissioned
Suggested answer: D
Explanation:

Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.

Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095

asked 16/09/2024
Siddig Ahmed
47 questions

Question 10

Report Export Collapse

Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

Neo Generals' problem
Neo Generals' problem
Byzantine Generals' problem
Byzantine Generals' problem
Byzantine Admirals' problem
Byzantine Admirals' problem
Renaissance Generals' problem
Renaissance Generals' problem
Suggested answer: B
Explanation:

BFT is so-named because it represents a solution to the "Byzantine generals' problem," a logical dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in 1982

Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058

asked 16/09/2024
Rolf Johannesen
43 questions
Total 230 questions
Go to page: of 23