Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.

Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.A . TrueB . FalseView AnswerAnswer: A

January 9, 2021 No Comments READ MORE +

In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.

In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.A . TrueB . FalseView AnswerAnswer: A

January 9, 2021 No Comments READ MORE +

Decentralization is an organizational risk due to decreased control over the organization's data.

Decentralization is an organizational risk due to decreased control over the organization's data.A . TrueB . FalseView AnswerAnswer: A

January 8, 2021 No Comments READ MORE +

Which of the following is NOT a common regulatory requirement tor businesses?

Which of the following is NOT a common regulatory requirement tor businesses?A . Data transparencyB . Data encryptionC . Personal data protectionD . Data controlView AnswerAnswer: A

January 8, 2021 No Comments READ MORE +

Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?

Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?A . Proof of StakeB . Proof of SpaceC . Proof of WorkD . Proof of ActivityView AnswerAnswer: C

January 8, 2021 No Comments READ MORE +

Blockchain technology is designated to be self-contained with no interaction with external components.

Blockchain technology is designated to be self-contained with no interaction with external components.A . TrueB . FalseView AnswerAnswer: B

January 8, 2021 No Comments READ MORE +

Which types of network attacks focus on partitioning the blockchain network? Select all that apply

Which types of network attacks focus on partitioning the blockchain network? Select all that applyA . EclipseB . SybilC . Denial of ServiceD . RoutingView AnswerAnswer: A,B,C

January 7, 2021 No Comments READ MORE +

Which of the following is designed to allow someone to prove they know a secret without revealing it?

Which of the following is designed to allow someone to prove they know a secret without revealing it?A . Confidential TransactionB . Ring SignatureC . Zero-Knowledge ProofD . Stealth AddressView AnswerAnswer: C

January 7, 2021 No Comments READ MORE +

Properly encrypted data stored in the distributed ledger adequately protects data in both the short-term and the long-term

Properly encrypted data stored in the distributed ledger adequately protects data in both the short-term and the long-termA . TrueB . FalseView AnswerAnswer: A

January 6, 2021 No Comments READ MORE +

This sample code is vulnerable to which of the following attacks? Select all that apply.

This sample code is vulnerable to which of the following attacks? Select all that apply.A . ReentrancyB . Unchecked Return ValuesC . ArithmeticD . Race ConditionsView AnswerAnswer: A,B,D

January 6, 2021 No Comments READ MORE +