ExamGecko
Home Home / Blockchain / CBSA

Blockchain CBSA Practice Test - Questions Answers, Page 20

Question list
Search
Search

Which one of the following is a consideration that must be taken into account when using Hyperledger Fabric that you wouldn't need worry about on Ethereum?

A.
The fees for deploying and using Smart Contracts
A.
The fees for deploying and using Smart Contracts
Answers
B.
How you will provide proper uptime for the network
B.
How you will provide proper uptime for the network
Answers
C.
The level of security of Smart Contracts (chaincode)
C.
The level of security of Smart Contracts (chaincode)
Answers
D.
How often hard forks occurs on the software
D.
How often hard forks occurs on the software
Answers
Suggested answer: D

Transactions can be only added to a blockchain.

A.
FALSE
A.
FALSE
Answers
B.
TRUE
B.
TRUE
Answers
Suggested answer: A

Proof of Stake offers which advantage over Proof of Work?

A.
Greater transaction speed
A.
Greater transaction speed
Answers
B.
It is compatible with new generation chipsets
B.
It is compatible with new generation chipsets
Answers
C.
It has a longer history and deeper knowledge base
C.
It has a longer history and deeper knowledge base
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: D

Ownership or partial ownership of an asset can be tracked with which type of token?

A.
Equity
A.
Equity
Answers
B.
Utility
B.
Utility
Answers
C.
Ethereum
C.
Ethereum
Answers
D.
Game-based
D.
Game-based
Answers
Suggested answer: B

A product's supply chain data is stored on blockchain. Only members of the product supply chain can write announcements to the blockchain but any consumer can query this data in a store to learn more about the product they want to buy. This is an example of a ____/____ blockchain.

A.
public /closed
A.
public /closed
Answers
B.
private / open
B.
private / open
Answers
C.
private / closed
C.
private / closed
Answers
D.
public / open
D.
public / open
Answers
Suggested answer: B

In common blockchain design, identity and transaction approval is possible through:

A.
AES encryption
A.
AES encryption
Answers
B.
Public key cryptography
B.
Public key cryptography
Answers
C.
Secret key cryptography
C.
Secret key cryptography
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: D

Explanation:

Reference: https://hackernoon.com/blockchain-technology-explained-introduction-meaning-and-applications-edbd6759a2b2

Which types of data are able to be stored on any given blockchain ledger?

A.
Each blockchain software specifies its own data storage rules
A.
Each blockchain software specifies its own data storage rules
Answers
B.
Any data that is within the UTC-8 standard
B.
Any data that is within the UTC-8 standard
Answers
C.
Unencrypted textual and numerical data
C.
Unencrypted textual and numerical data
Answers
D.
Encrypted textual and numerical data
D.
Encrypted textual and numerical data
Answers
Suggested answer: D

In Proof of Work group consensus, the "nonce" refers to?

A.
The random data to be combined with the block data which will produce a hash output matching the current difficulty level
A.
The random data to be combined with the block data which will produce a hash output matching the current difficulty level
Answers
B.
Random nonsense data inserted at the end of a block to fill it completely
B.
Random nonsense data inserted at the end of a block to fill it completely
Answers
C.
The average Bitcoin price over the last 90 days
C.
The average Bitcoin price over the last 90 days
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: A

Explanation:

Reference: https://en.bitcoin.it/wiki/Nonce

In common blockchain design, blockchain addresses or "accounts" are generated by:

A.
A PRNG output guaranteed to be unique
A.
A PRNG output guaranteed to be unique
Answers
B.
A server/node timestamp added to a PRNG output
B.
A server/node timestamp added to a PRNG output
Answers
C.
Creating a hash based on a cryptographic public key and various meta data
C.
Creating a hash based on a cryptographic public key and various meta data
Answers
D.
The most recent block height hash combined with a cryptographic private key
D.
The most recent block height hash combined with a cryptographic private key
Answers
Suggested answer: C

When a blockchain software is updated with new functionality that breaks or modifies the rules of the previous version of the software, what has just occurred?

A.
A hard fork
A.
A hard fork
Answers
B.
Revision Reversal Attack
B.
Revision Reversal Attack
Answers
C.
A software fault
C.
A software fault
Answers
D.
Autonomous update consensus
D.
Autonomous update consensus
Answers
Suggested answer: A
Total 230 questions
Go to page: of 23