ExamGecko
Home Home / Blockchain / CBSA

Blockchain CBSA Practice Test - Questions Answers, Page 21

Question list
Search
Search

Complex application components should try to be concentrated in which application layer?

A.
Interface layer / middle
A.
Interface layer / middle
Answers
B.
Presentation / top
B.
Presentation / top
Answers
C.
Smart Contract / bottom
C.
Smart Contract / bottom
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: B

Byzantine Fault Tolerance can be achieved only through a Proof of Work.

A.
FALSE
A.
FALSE
Answers
B.
TRUE
B.
TRUE
Answers
Suggested answer: A

Which scenario would it be most appropriate for a blockchain solution to implement a Proof of Work or Proof of Stake consensus?

A.
When the blockchain needs to be permissioned
A.
When the blockchain needs to be permissioned
Answers
B.
When the aim of the blockchain is to be a trustless as possible
B.
When the aim of the blockchain is to be a trustless as possible
Answers
C.
When the blockchain needs to support millions of transactions
C.
When the blockchain needs to support millions of transactions
Answers
D.
All of the above
D.
All of the above
Answers
Suggested answer: B

A Smart Contract is most like which classical programming object?

A.
Class
A.
Class
Answers
B.
Variable
B.
Variable
Answers
C.
Method
C.
Method
Answers
D.
Function
D.
Function
Answers
Suggested answer: D

How are blocks of data "chained" together to ensure the integrity of transactions?

A.
The hash of the previous block is written to the header of the current block
A.
The hash of the previous block is written to the header of the current block
Answers
B.
The ID of the previous block is stored in the current block
B.
The ID of the previous block is stored in the current block
Answers
C.
A public key is stored in each block for data decryption
C.
A public key is stored in each block for data decryption
Answers
D.
The hash of the genesis block is kept in all block headers
D.
The hash of the genesis block is kept in all block headers
Answers
Suggested answer: A

In public key cryptography, the public key is used to:

A.
Sign/approve any transaction/action that might be made by the holder of the key pair
A.
Sign/approve any transaction/action that might be made by the holder of the key pair
Answers
B.
Verify the digital signature of a given key pair
B.
Verify the digital signature of a given key pair
Answers
C.
Decrypt the private key so valid transactions/actions can be performed
C.
Decrypt the private key so valid transactions/actions can be performed
Answers
D.
Encrypt the private key
D.
Encrypt the private key
Answers
Suggested answer: D

Explanation:

Reference: https://www.globalsign.com/en/ssl-information-center/what-is-public-key-cryptography/

Which one of the following is true regarding Smart Contracts on the Ethereum blockchain?

A.
They provide added security over off-chain transaction code on other blockchain networks
A.
They provide added security over off-chain transaction code on other blockchain networks
Answers
B.
Because they are compiled into bytecode they cannot be used in an unintended manner
B.
Because they are compiled into bytecode they cannot be used in an unintended manner
Answers
C.
Any flaw discovered in their code can quickly be updated and redeployed
C.
Any flaw discovered in their code can quickly be updated and redeployed
Answers
D.
They are Turing complete and deterministic in nature
D.
They are Turing complete and deterministic in nature
Answers
Suggested answer: D

Explanation:

Reference: https://blockgeeks.com/guides/different-smart-contract-platforms/

It is impossible to persist media types such as MP3 and MOV on any distributed ledger.

A.
FALSE
A.
FALSE
Answers
B.
TRUE
B.
TRUE
Answers
Suggested answer: A

To approve pending ledger transactions, consensus algorithms often implement:

A.
Byzantine Fault Tolerance
A.
Byzantine Fault Tolerance
Answers
B.
Access Control
B.
Access Control
Answers
C.
Kerckhoffs's Principle
C.
Kerckhoffs's Principle
Answers
D.
Common Weakness Enumeration
D.
Common Weakness Enumeration
Answers
Suggested answer: A

Explanation:

Reference: https://applicature.com/blog/crypto-enthusiasts/bitcoin-transaction

Anonymity can be protected in blockchain applications by use of which of the following?

A.
Centralized application hosting
A.
Centralized application hosting
Answers
B.
End-to-end encryption
B.
End-to-end encryption
Answers
C.
Cryptographic hashing
C.
Cryptographic hashing
Answers
D.
Blockchain-based data cubes
D.
Blockchain-based data cubes
Answers
Suggested answer: B
Total 230 questions
Go to page: of 23