The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms
The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithmsA . TrueB . FalseView AnswerAnswer: B
The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.
The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.A . TrueB . FalseView AnswerAnswer: A
The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network
The code of smart contracts that are "self-destructed" is no longer visible to the blockchain networkA . TrueB . FalseView AnswerAnswer: B
Spinning up a large number of temporary mining servers is likely part of what type of attack?
Spinning up a large number of temporary mining servers is likely part of what type of attack?A . RoutingB . Denial of ServiceC . SybilD . EclipseView AnswerAnswer: C
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that applyA . BitcoinB . EOSC . VergeD . ListView AnswerAnswer: C,D
Compromising blockchain accounts is beneficial to which of the following types ot attacks?
Compromising blockchain accounts is beneficial to which of the following types ot attacks?A . 51% AttackB . Eclipse AttackC . Routing AttackD . Sybil AttackE . All of the aboveView AnswerAnswer: D
Which of the following biockchains uses a channel-focused architectural design?
Which of the following biockchains uses a channel-focused architectural design?A . HyperledgerB . CordaC . EthereumView AnswerAnswer: A
Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.
Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.A . ScaleB . EfficiencyC . Access ControlD . DecentralizationView AnswerAnswer: B,C
A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.
A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.A . TrueB . FalseView AnswerAnswer: A
Sidechains can benefit the mainchain in what ways? Select all that apply
Sidechains can benefit the mainchain in what ways? Select all that applyA . SpeedB . FunctionalityC . ScalabilityD . SecurityView AnswerAnswer: B,C