ExamGecko
Home / Blockchain / CBSA / List of questions
Ask Question

Blockchain CBSA Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

You are using Geth and you would like to list the accounts controlled by the node.

What is the command?

geth list accounts
geth list accounts
geth account node list
geth account node list
geth account node
geth account node
geth account list
geth account list
Suggested answer: D
Explanation:

Reference: https://datawookie.netlify.com/blog/2018/01/ethereum-running-a-node/

asked 16/09/2024
Tommy Svendsen
41 questions

Question 62

Report Export Collapse

___________________ensures that the shared ledgers are exact copies, and lowers the risk of fraudulent transactions, because tampering would have to occur across many places at exactly the same time.

Encryption
Encryption
Consensus
Consensus
Validation
Validation
Replication
Replication
Suggested answer: B
Explanation:

Consensus ensures that the shared ledgers are exact copies, and lowers the risk of fraudulent transactions, because tampering would have to occur across many places at exactly the same time

Reference: https://www.ibm.com/developerworks/cloud/library/cl-blockchain-basics-intro-bluemix-trs/index.html

asked 16/09/2024
ERIC LUM
43 questions

Question 63

Report Export Collapse


Ethereum tries to keep the mining time difference between ____ and _____seconds.

10, 18
10, 18
10, 20
10, 20
10, 29
10, 29
10, 19
10, 19
Suggested answer: D
Explanation:

Reference: https://dltlabs.com/how-difficulty-adjustment-algorithm-works-in-ethereum/

asked 16/09/2024
Jose Gonzalez
47 questions

Question 64

Report Export Collapse

Which of the following cryptocurrencies use an alternate consensus method called "Scrypt" to BTC's Proof of Work (POW) SHA-256 algorithm?

Ripple
Ripple
Peercoin
Peercoin
Litecoin
Litecoin
Steemit
Steemit
Suggested answer: C
Explanation:

The Scrypt hash function was initially implemented by the Litecoin development team to avoid what are known, ASICs, from being able mine its cryptocurrency. When mining for cryptocurrencies, users typically have an option between: a CPU, GPU or ASIC miner.

Reference: https://www.mycryptopedia.com/litecoin-scrypt-algorithm-explained/

asked 16/09/2024
sushil divate
42 questions

Question 65

Report Export Collapse

What is chaincode?

Smart contract
Smart contract
DApps
DApps
Node programs
Node programs
Virtual machines
Virtual machines
Suggested answer: A
Explanation:

Reference: http://hyperledger-fabric.readthedocs.io/en/release-1.1/chaincode.html

asked 16/09/2024
Sharanjit Kareer
45 questions

Question 66

Report Export Collapse

Addresses on a blockchain are derived by a process of hashing _________.

Wallet Addresses
Wallet Addresses
Private Keys
Private Keys
IP Addresses
IP Addresses
Mac addresses
Mac addresses
Public Keys
Public Keys
Suggested answer: E
Explanation:

Reference: https://medium.com/@ConsenSys/blockchain-underpinnings-hashing-7f4746cbd66b

asked 16/09/2024
Heidar Heidari nia
41 questions

Question 67

Report Export Collapse

When considering a new ERC20 token its best to consider using ____________________.

Use a template from AWS
Use a template from AWS
Audited Implementation
Audited Implementation
Start a new one
Start a new one
Copy from existing token
Copy from existing token
Suggested answer: A
Explanation:

Reference: https://medium.com/@merunasgrincalaitis/gain-ethereum-ico-trust-credibility-e9e53145c331

asked 16/09/2024
Pedro Miguel Garcia Valdes
45 questions

Question 68

Report Export Collapse

Smart Contracts are generally written in specific programming languages. Which one is NOT a language for smart contracts?

.Net
.Net
Viper
Viper
LLL
LLL
Solidity
Solidity
Suggested answer: A
asked 16/09/2024
Feras Al Babtain
31 questions

Question 69

Report Export Collapse

What is diagram referencing below?

Blockchain CBSA image Question 69 20330 09162024192153000000

AND Gate
AND Gate
XOR Gate
XOR Gate
OXR Gate
OXR Gate
NAND Gate
NAND Gate
Suggested answer: B
Explanation:

XOR or "Exclusive OR" is a logic gate.

Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

asked 16/09/2024
Sajan Limbu
33 questions

Question 70

Report Export Collapse

Which of the following is considered the most popular public key encryption algorithm?

RSA
RSA
AES
AES
MD5
MD5
PGP
PGP
Suggested answer: D
Explanation:

Reference: https://medium.com/@ConsenSys/blockchain-underpinnings-hashing-7f4746cbd66b

asked 16/09/2024
Andrew dela Cruz
36 questions
Total 230 questions
Go to page: of 23