The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms

The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithmsA . TrueB . FalseView AnswerAnswer: B

January 15, 2021 No Comments READ MORE +

The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.

The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.A . TrueB . FalseView AnswerAnswer: A

January 14, 2021 No Comments READ MORE +

The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network

The code of smart contracts that are "self-destructed" is no longer visible to the blockchain networkA . TrueB . FalseView AnswerAnswer: B

January 13, 2021 No Comments READ MORE +

Spinning up a large number of temporary mining servers is likely part of what type of attack?

Spinning up a large number of temporary mining servers is likely part of what type of attack?A . RoutingB . Denial of ServiceC . SybilD . EclipseView AnswerAnswer: C

January 12, 2021 No Comments READ MORE +

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that applyA . BitcoinB . EOSC . VergeD . ListView AnswerAnswer: C,D

January 12, 2021 No Comments READ MORE +

Compromising blockchain accounts is beneficial to which of the following types ot attacks?

Compromising blockchain accounts is beneficial to which of the following types ot attacks?A . 51% AttackB . Eclipse AttackC . Routing AttackD . Sybil AttackE . All of the aboveView AnswerAnswer: D

January 11, 2021 No Comments READ MORE +

Which of the following biockchains uses a channel-focused architectural design?

Which of the following biockchains uses a channel-focused architectural design?A . HyperledgerB . CordaC . EthereumView AnswerAnswer: A

January 11, 2021 No Comments READ MORE +

Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.

Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.A . ScaleB . EfficiencyC . Access ControlD . DecentralizationView AnswerAnswer: B,C

January 10, 2021 No Comments READ MORE +

A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.

A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.A . TrueB . FalseView AnswerAnswer: A

January 9, 2021 No Comments READ MORE +

Sidechains can benefit the mainchain in what ways? Select all that apply

Sidechains can benefit the mainchain in what ways? Select all that applyA . SpeedB . FunctionalityC . ScalabilityD . SecurityView AnswerAnswer: B,C

January 9, 2021 No Comments READ MORE +