ExamGecko
Home Home / Blockchain / CBSA

Blockchain CBSA Practice Test - Questions Answers, Page 4

Question list
Search
Search

The ____________of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as ________nodes. Each node is simply a cryptographic hash of a transaction.

In the above diagram, Transaction A,B, C,C from the leaves of the tree. Select one.

A.
Root, Hash
A.
Root, Hash
Answers
B.
Root, Leaf Nodes
B.
Root, Leaf Nodes
Answers
C.
Has, Root nodes
C.
Has, Root nodes
Answers
D.
Leaf nodes, Root
D.
Leaf nodes, Root
Answers
E.
Leaf Nodes, Root
E.
Leaf Nodes, Root
Answers
Suggested answer: B

Explanation:

The root of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as leaf nodes. Each node is simply a cryptographic hash of a transaction. In the above diagram, Transaction A,B,C,C form the leaves of the tree.

Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2

Which of the following blockchain is NOT a permissioned blockchain?

A.
Quantum
A.
Quantum
Answers
B.
Ethereum
B.
Ethereum
Answers
C.
R3 Corda
C.
R3 Corda
Answers
D.
Ripple
D.
Ripple
Answers
E.
Hyperledger
E.
Hyperledger
Answers
Suggested answer: B

What blockchain is considered Blockchain 1.0, the first blockchain?

A.
Bitcoin Cash
A.
Bitcoin Cash
Answers
B.
Ethereum
B.
Ethereum
Answers
C.
Litecoin
C.
Litecoin
Answers
D.
Bitcoin
D.
Bitcoin
Answers
E.
NEO
E.
NEO
Answers
Suggested answer: D

Explanation:

Blockchain 1.0, Grandpa Bitcoin

Reference: https://hackernoon.com/a-brief-history-in-the-evolution-of-blockchain-technology-platforms-1bb2bad8960a


In the EVM every account has a persistent key-value store mapping 256-bit words to 256-bit words called ________

A.
Gas
A.
Gas
Answers
B.
Space
B.
Space
Answers
C.
Storage
C.
Storage
Answers
D.
Datastore
D.
Datastore
Answers
E.
Database
E.
Database
Answers
Suggested answer: C

Explanation:

Every account has a persistent key-value store mapping 256-bit words to 256-bit words called storage.

Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine

______ is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain.

A.
Mist
A.
Mist
Answers
B.
Mix
B.
Mix
Answers
C.
Truffle
C.
Truffle
Answers
D.
Metamask
D.
Metamask
Answers
E.
Embark
E.
Embark
Answers
Suggested answer: B

Explanation:

Mix is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain

What is the language that Solidity is using to build on the Ethereum Virtual Machines(EVM)?

A.
.Net
A.
.Net
Answers
B.
Javascript
B.
Javascript
Answers
C.
C++
C.
C++
Answers
D.
Node.js
D.
Node.js
Answers
E.
PHP
E.
PHP
Answers
Suggested answer: B

Explanation:

Javascript is the language that Solidity is using to build on the Ethereum Virtual Machine

Reference: https://www.quora.com/What-is-the-best-programming-language-to-learn-if-you-want-to-work-on-the-blockchain

Regarding Ethereum contracts, the contracts can call (perform) two specific message calls. The message calls are either _____________ or __________? (Select two.)

A.
Bitcoin nodes
A.
Bitcoin nodes
Answers
B.
Send Ether to non-contract
B.
Send Ether to non-contract
Answers
C.
DApps
C.
DApps
Answers
D.
Other contracts
D.
Other contracts
Answers
E.
Ether Nodes
E.
Ether Nodes
Answers
Suggested answer: B, D

Explanation:

Contracts can call other contracts or send Ether to non-contract accounts by the means of message calls. Message calls are similar to transactions, in that they have a source, a target, data payload, Ether, gas and return data. In fact, every transaction consists of a top-level message call which in turn can create further message calls.

Which of the following hashing algos is considered to be the strongest?

A.
RSA
A.
RSA
Answers
B.
SHA-2
B.
SHA-2
Answers
C.
AES
C.
AES
Answers
D.
MD-5
D.
MD-5
Answers
E.
SHA
E.
SHA
Answers
Suggested answer: B

Explanation:

SHA-2 consists of a set of 6 hashing algorithms, and is considered the strongest. SHA-256 or above is recommended for situations are security is vital. SHA-256 produces 32-byte hash values.

Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting

When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)

A.
Block Ciphers
A.
Block Ciphers
Answers
B.
Rivest-Shamir-Adleman algorithm aka the RSA.
B.
Rivest-Shamir-Adleman algorithm aka the RSA.
Answers
C.
Stream Ciphers
C.
Stream Ciphers
Answers
D.
Elliptical Curve Cryptography
D.
Elliptical Curve Cryptography
Answers
Suggested answer: A, C

Explanation:

Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

The___________________ is the runtime environment for smart contracts in Ethereum?

A.
Metamask
A.
Metamask
Answers
B.
Ether
B.
Ether
Answers
C.
Mist
C.
Mist
Answers
D.
EVM
D.
EVM
Answers
Suggested answer: D

Explanation:

EVM The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.

Total 230 questions
Go to page: of 23