Blockchain CBSA BTA Certified Blockchain Solution Architect Online Training
Blockchain CBSA Online Training
The questions for CBSA were last updated at Dec 20,2024.
- Exam Code: CBSA
- Exam Name: BTA Certified Blockchain Solution Architect
- Certification Provider: Blockchain
- Latest update: Dec 20,2024
Which of the following blockchain key components state how the transactions will be confirmed?
- A . Distributed Ledger database
- B . Validity Rules
- C . Consensus Algorithm
- D . Encryption
What type of "bug" generally occurs when something isn’t right according to business requirements?
- A . Business logic
- B . Business Requirements
- C . Integration
- D . Accessibility
- E . Security
Looking the graph below, what type of an attack is this likely?
- A . 51% Attack
- B . P+ Epsilon Attack
- C . Blacklisting
- D . Selfish Mining Attack
A ____________cipher basically means it is using a fixed key which replaces the message
with a pseudorandom string of characters.
It is basically the encryption of each letter one at a time.
What is the cipher type?
- A . Stream
- B . Block
- C . Parallel
- D . RSA
A product’s supply chain data is stored on blockchain. Only members of the product supply chain can write announcements to the blockchain but any consumer can query this data in a store to learn more about the product they want to buy. This is an example of a ____/____ blockchain.
- A . public /closed
- B . private / open
- C . private / closed
- D . public / open
Consider the following scenario: A large department store chain is being pressured by lawmakers to provide evidence that proves the store’s clothing is not produced through child labor. This is no easy task currently due to the store’s clothing being transferred between at least 6 different parties in between creation and placement at the storefront. The store chain is considering the use of blockchain to solve their problem. Discretion in the reading and writing of transactions is highly important to the store chain to protect its proprietary interests.
Which solution would best solve the product need?
- A . Use a public blockchain that supports assets, then create a new clothing asset for each item created. When the clothing item is transferred to the next party in the process, require that the associated blockchain asset be transferred to the next party’s blockchain account with relevant metadata. The lawmakers can now view the transactions and transfers at any time.
- B . Use a permissioned blockchain to build the technology. Require every party involved in the process to host a node on you network. Create a new clothing asset for each item created. When the clothing item is transferred to the next party in the process, have the previous party use your web portal to initialize a chaincode Smart Contract to transfer control of the asset. When the next party receives the asset have them use your web portal to initialize a chaincode Smart Contracts to acknowledge receipt of the asset. Provide read-only permissions to the lawmakers so they can receive the evidence they are looking for.
- C . Both options are equally suitable
- D . None of the above
Addresses on a blockchain are derived by a process of hashing _________.
- A . Wallet Addresses
- B . Private Keys
- C . IP Addresses
- D . Mac addresses
- E . Public Keys
In the Bitcoin blockchain the "block creation time" is set to 10 minutes and this can never change.
- A . FALSE
- B . TRUE
Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda.
What is the best answer?
- A . R3 Corda is a pluggable blockchain and allows the enterprise flexibility
- B . R3 Corda is a byzantine fault tolerant blokchain
- C . R3 Corda is a proof of stake based blockchain
- D . R3 Corda is a proof of work based blockchain
How does a client app communicate with Hyperledger fabric chaincode (Smart Contracts)?
- A . The app uses an SDK which invokes functionality on the chaincode which then announces the transaction to any peers required to endorse the transaction
- B . The app uses Hyperledger Composer to communicate with CouchDB which in turn invokes chaincode functionality
- C . Client apps don’t communicate with Hyperledger fabric directly, they must use Hyperledger Composer for the transmission
- D . The app points to a node’s IP address, then calls an invoke function on the chaincode address to start the write process