In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?A . Selfish Mining AttackB . Long-Range AttackC . Double-Spend AttackD . 51% Attack View Answer Answer: B...
Continue readingBoth sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.
Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.A . TrueB . False View Answer Answer: B...
Continue readingProof of Work never guarantees that the blockchain network has reached consensus
Proof of Work never guarantees that the blockchain network has reached consensusA . TrueB . False View Answer Answer: B...
Continue readingWhich type of attack misuses Internet protocols to attack the blockchain? Select all that apply.
Which type of attack misuses Internet protocols to attack the blockchain? Select all that apply.A . Denial of ServiceB . EclipseC . SybilD . Routing View Answer Answer: A,B,C...
Continue readingIn which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?A . Proof of BurnB . Proof of WorkC . Proof of StakeD . Proof of ActivityE . None of the above View Answer Answer: A...
Continue readingRing signatures are designed to do which of the following?
Ring signatures are designed to do which of the following?A . Conceal transaction amountB . Conceal transaction recipientC . Conceal shared secretD . Conceal transaction sender View Answer Answer: D...
Continue readingIf an attacker can find two values that hash to the same output what is it called?
If an attacker can find two values that hash to the same output what is it called?A . MatchB . IntersectionC . CollisionD . Correlation View Answer Answer: C...
Continue readingWhich of the following blockchains has a built-in consensus algorithm?
Which of the following blockchains has a built-in consensus algorithm?A . EthereumB . CordaC . Hyperledger View Answer Answer: A...
Continue readingWhich smart contract vulnerability allows an attacker to make a profit off a smart contract cryptocurrency exchange like Bancor?
Which smart contract vulnerability allows an attacker to make a profit off a smart contract cryptocurrency exchange like Bancor?A . ArithmeticB . Access ControlC . Race ConditionsD . Reentrancy View Answer Answer: C...
Continue readingWhat is the easiest way to steal cryptocurrency from a user?
What is the easiest way to steal cryptocurrency from a user?A . Private key theftB . Double-spend attackC . Consensus hijackingD . Eclipse attackE . None of the above View Answer Answer: A...
Continue reading