Blockchain CBSA Exam Practice Questions (P. 1)
- Full Access (229 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).
- A256
- B128
- C32
- D20
Correct Answer:
D
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.
Reference:
https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
D
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.
Reference:
https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
send
light_mode
delete
Question #2
What type of attack would be considered a very large flaw in public blockchains such as Bitcoin's Blockchain where the majority of hashpower could possibly be controlled thru an attack?
What is the specific attack Bitcoin could be exposed to?
What is the specific attack Bitcoin could be exposed to?
- A51% Attacks
- BTether Token Hack
- CDDoS Attack
- DBIP attack
- EParity Wallet Attack
Correct Answer:
A
Reference:
https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/
A
Reference:
https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/
send
light_mode
delete
Question #3
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)
- A1,000,000,000,000,000,000
- B1,000,000,000,000,000
- C1,000,000,000
- D10,000
- E1,000,000,000,000
Correct Answer:
AB
Reference:
http://www.btcsatoshi.com/
AB
Reference:
http://www.btcsatoshi.com/
send
light_mode
delete
Question #4
In the Proof of Stake(POS) algorithm the miners are really known as ___________?
- ANotary
- BOracle
- CForgers
- DMintersMost Voted
Correct Answer:
C
Proof of Stake has the same goal as proof of work""to validate transactions and achieve consensus in the chain""and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum co-founder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.
Reference:
http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
C
Proof of Stake has the same goal as proof of work""to validate transactions and achieve consensus in the chain""and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum co-founder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.
Reference:
http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
send
light_mode
delete
Question #5
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________.
What is required?
What is required?
- AConsensus
- BCrypthography
- CBandwidth
- DAvailability
Correct Answer:
A
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus.
Reference:
https://en.wikipedia.org/wiki/Byzantine_fault_tolerance
A
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus.
Reference:
https://en.wikipedia.org/wiki/Byzantine_fault_tolerance
send
light_mode
delete
All Pages