ExamGecko
Home / Blockchain / CBSA / List of questions
Ask Question

Blockchain CBSA Practice Test - Questions Answers, Page 4

Question list
Search

Question 31

Report
Export
Collapse

The ____________of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as ________nodes. Each node is simply a cryptographic hash of a transaction.

Blockchain CBSA image Question 31 20292 09162024192153000000

In the above diagram, Transaction A,B, C,C from the leaves of the tree. Select one.

Root, Hash
Root, Hash
Root, Leaf Nodes
Root, Leaf Nodes
Has, Root nodes
Has, Root nodes
Leaf nodes, Root
Leaf nodes, Root
Leaf Nodes, Root
Leaf Nodes, Root
Suggested answer: B

Explanation:

The root of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as leaf nodes. Each node is simply a cryptographic hash of a transaction. In the above diagram, Transaction A,B,C,C form the leaves of the tree.

Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2

asked 16/09/2024
john lopez
27 questions

Question 32

Report
Export
Collapse

Which of the following blockchain is NOT a permissioned blockchain?

Quantum
Quantum
Ethereum
Ethereum
R3 Corda
R3 Corda
Ripple
Ripple
Hyperledger
Hyperledger
Suggested answer: B
asked 16/09/2024
Justin NJOCK
45 questions

Question 33

Report
Export
Collapse

What blockchain is considered Blockchain 1.0, the first blockchain?

Bitcoin Cash
Bitcoin Cash
Ethereum
Ethereum
Litecoin
Litecoin
Bitcoin
Bitcoin
NEO
NEO
Suggested answer: D

Explanation:

Blockchain 1.0, Grandpa Bitcoin

Reference: https://hackernoon.com/a-brief-history-in-the-evolution-of-blockchain-technology-platforms-1bb2bad8960a

asked 16/09/2024
josh hill
37 questions

Question 34

Report
Export
Collapse


In the EVM every account has a persistent key-value store mapping 256-bit words to 256-bit words called ________

Gas
Gas
Space
Space
Storage
Storage
Datastore
Datastore
Database
Database
Suggested answer: C

Explanation:

Every account has a persistent key-value store mapping 256-bit words to 256-bit words called storage.

Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine

asked 16/09/2024
Yohan Frachisse
28 questions

Question 35

Report
Export
Collapse

______ is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain.

Mist
Mist
Mix
Mix
Truffle
Truffle
Metamask
Metamask
Embark
Embark
Suggested answer: B

Explanation:

Mix is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain

asked 16/09/2024
Leon Duke
37 questions

Question 36

Report
Export
Collapse

What is the language that Solidity is using to build on the Ethereum Virtual Machines(EVM)?

.Net
.Net
Javascript
Javascript
C++
C++
Node.js
Node.js
PHP
PHP
Suggested answer: B

Explanation:

Javascript is the language that Solidity is using to build on the Ethereum Virtual Machine

Reference: https://www.quora.com/What-is-the-best-programming-language-to-learn-if-you-want-to-work-on-the-blockchain

asked 16/09/2024
Vincent Dsouza
37 questions

Question 37

Report
Export
Collapse

Regarding Ethereum contracts, the contracts can call (perform) two specific message calls. The message calls are either _____________ or __________? (Select two.)

Bitcoin nodes
Bitcoin nodes
Send Ether to non-contract
Send Ether to non-contract
DApps
DApps
Other contracts
Other contracts
Ether Nodes
Ether Nodes
Suggested answer: B, D

Explanation:

Contracts can call other contracts or send Ether to non-contract accounts by the means of message calls. Message calls are similar to transactions, in that they have a source, a target, data payload, Ether, gas and return data. In fact, every transaction consists of a top-level message call which in turn can create further message calls.

asked 16/09/2024
Newton Vela
39 questions

Question 38

Report
Export
Collapse

Which of the following hashing algos is considered to be the strongest?

RSA
RSA
SHA-2
SHA-2
AES
AES
MD-5
MD-5
SHA
SHA
Suggested answer: B

Explanation:

SHA-2 consists of a set of 6 hashing algorithms, and is considered the strongest. SHA-256 or above is recommended for situations are security is vital. SHA-256 produces 32-byte hash values.

Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting

asked 16/09/2024
Malik Khabir
34 questions

Question 39

Report
Export
Collapse

When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)

Block Ciphers
Block Ciphers
Rivest-Shamir-Adleman algorithm aka the RSA.
Rivest-Shamir-Adleman algorithm aka the RSA.
Stream Ciphers
Stream Ciphers
Elliptical Curve Cryptography
Elliptical Curve Cryptography
Suggested answer: A, C

Explanation:

Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

asked 16/09/2024
Quratulain Damani
42 questions

Question 40

Report
Export
Collapse

The___________________ is the runtime environment for smart contracts in Ethereum?

Metamask
Metamask
Ether
Ether
Mist
Mist
EVM
EVM
Suggested answer: D

Explanation:

EVM The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.

asked 16/09/2024
Viswanadha Sastry Kattamuri
44 questions
Total 230 questions
Go to page: of 23