ExamGecko
Home Home / Blockchain / CBSA

Blockchain CBSA Practice Test - Questions Answers

Question list
Search
Search

SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).

A.
256
A.
256
Answers
B.
128
B.
128
Answers
C.
32
C.
32
Answers
D.
20
D.
20
Answers
Suggested answer: D

Explanation:

SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.

Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting

What type of attack would be considered a very large flaw in public blockchains such as Bitcoin's Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

A.
51% Attacks
A.
51% Attacks
Answers
B.
Tether Token Hack
B.
Tether Token Hack
Answers
C.
DDoS Attack
C.
DDoS Attack
Answers
D.
BIP attack
D.
BIP attack
Answers
E.
Parity Wallet Attack
E.
Parity Wallet Attack
Answers
Suggested answer: A

Explanation:

Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/

How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)

A.
1,000,000,000,000,000,000
A.
1,000,000,000,000,000,000
Answers
B.
1,000,000,000,000,000
B.
1,000,000,000,000,000
Answers
C.
1,000,000,000
C.
1,000,000,000
Answers
D.
10,000
D.
10,000
Answers
E.
1,000,000,000,000
E.
1,000,000,000,000
Answers
Suggested answer: A, B

Explanation:

Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html

In the Proof of Stake(POS) algorithm the miners are really known as ___________?

A.
Notary
A.
Notary
Answers
B.
Oracle
B.
Oracle
Answers
C.
Forgers
C.
Forgers
Answers
D.
Minters
D.
Minters
Answers
Suggested answer: C

Explanation:

Proof of Stake has the same goal as proof of work"”to validate transactions and achieve consensus in the chain"”and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum cofounder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.

Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________. What is required?

A.
Consensus
A.
Consensus
Answers
B.
Crypthography
B.
Crypthography
Answers
C.
Bandwidth
C.
Bandwidth
Answers
D.
Availability
D.
Availability
Answers
Suggested answer: A

Explanation:

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. Reference: https://en.wikipedia.org/wiki/ Byzantine_fault_tolerance

A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

A.
Stream
A.
Stream
Answers
B.
Block
B.
Block
Answers
C.
Parallel
C.
Parallel
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: A

Explanation:

Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin. What is Etherscan used for?

A.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum Blockchain
A.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum Blockchain
Answers
B.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Bitcoin Blockchain
B.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Bitcoin Blockchain
Answers
C.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum and Tokens Blockchain
C.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum and Tokens Blockchain
Answers
D.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on any Blockchain
D.
A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on any Blockchain
Answers
Suggested answer: A

Explanation:

A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum Blockchain

Reference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-

What are two challenges with using a Proof of Work algorithm? (Select two.)

A.
Mining pools not allowed
A.
Mining pools not allowed
Answers
B.
Difficulty rate goes done every year.
B.
Difficulty rate goes done every year.
Answers
C.
Expensive
C.
Expensive
Answers
D.
Power Intensive
D.
Power Intensive
Answers
Suggested answer: C, D

Explanation:

Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read

Your customer is an enterprise that is focused on financial sectors. What type of blockchain would this customer likely want specified for their enterprise?

A.
Permissionless
A.
Permissionless
Answers
B.
Decentralized
B.
Decentralized
Answers
C.
Hybrid
C.
Hybrid
Answers
D.
Permissioned
D.
Permissioned
Answers
Suggested answer: D

Explanation:

Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.

Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095

Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

A.
Neo Generals' problem
A.
Neo Generals' problem
Answers
B.
Byzantine Generals' problem
B.
Byzantine Generals' problem
Answers
C.
Byzantine Admirals' problem
C.
Byzantine Admirals' problem
Answers
D.
Renaissance Generals' problem
D.
Renaissance Generals' problem
Answers
Suggested answer: B

Explanation:

BFT is so-named because it represents a solution to the "Byzantine generals' problem," a logical dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in 1982

Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058

Total 230 questions
Go to page: of 23