Blockchain CBSA Practice Test - Questions Answers, Page 4
List of questions
Related questions
Question 31

The ____________of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as ________nodes. Each node is simply a cryptographic hash of a transaction.
In the above diagram, Transaction A,B, C,C from the leaves of the tree. Select one.
Explanation:
The root of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as leaf nodes. Each node is simply a cryptographic hash of a transaction. In the above diagram, Transaction A,B,C,C form the leaves of the tree.
Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2
Question 32

Which of the following blockchain is NOT a permissioned blockchain?
Question 33

What blockchain is considered Blockchain 1.0, the first blockchain?
Explanation:
Blockchain 1.0, Grandpa Bitcoin
Reference: https://hackernoon.com/a-brief-history-in-the-evolution-of-blockchain-technology-platforms-1bb2bad8960a
Question 34

In the EVM every account has a persistent key-value store mapping 256-bit words to 256-bit words called ________
Explanation:
Every account has a persistent key-value store mapping 256-bit words to 256-bit words called storage.
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
Question 35

______ is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain.
Explanation:
Mix is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain
Question 36

What is the language that Solidity is using to build on the Ethereum Virtual Machines(EVM)?
Explanation:
Javascript is the language that Solidity is using to build on the Ethereum Virtual Machine
Reference: https://www.quora.com/What-is-the-best-programming-language-to-learn-if-you-want-to-work-on-the-blockchain
Question 37

Regarding Ethereum contracts, the contracts can call (perform) two specific message calls. The message calls are either _____________ or __________? (Select two.)
Explanation:
Contracts can call other contracts or send Ether to non-contract accounts by the means of message calls. Message calls are similar to transactions, in that they have a source, a target, data payload, Ether, gas and return data. In fact, every transaction consists of a top-level message call which in turn can create further message calls.
Question 38

Which of the following hashing algos is considered to be the strongest?
Explanation:
SHA-2 consists of a set of 6 hashing algorithms, and is considered the strongest. SHA-256 or above is recommended for situations are security is vital. SHA-256 produces 32-byte hash values.
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
Question 39

When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)
Explanation:
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question 40

The___________________ is the runtime environment for smart contracts in Ethereum?
Explanation:
EVM The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.
Question