Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A Smart Contract needs to check the daily closing price of a stock, in order to determine how to act. The proper way to do this is with the use of ______________.

A.

Oracles

B.

Wizards

C.

Data rabbits

D.

All of the above

Full Access
Question # 5

Chaincode is a decentralized transactional program, running on the validating nodes. As with every chaincode, it implements the ____________________ in particular, Init and Invoke functions.

What does is actually implemented?

A.

SDK

B.

REST Interface

C.

EVM

D.

Chaincode interface

Full Access
Question # 6

Hyperledger Composer has two main components.

What are the two components? (Select two.)

A.

Fabric

B.

Sawtooth

C.

Playground

D.

Explorer

E.

Business Network Archive

F.

SDK

Full Access
Question # 7

The Hyperledger Fabric business network is divided into three categories.

What are the three categories? (Select three.)

A.

Membership

B.

Chaincode

C.

Networking

D.

EVM

E.

Blockchain

Full Access
Question # 8

To prevent duplicate addresses/accounts from being generated on the same blockchain network, the input of the hash function that generates the address:

A.

Should never be plain text

B.

Should always be numerical

C.

Should first be encrypted

D.

Should contain enough entropy or randomness

Full Access
Question # 9

If a Proof of Work blockchain such a s Bitcoin or Ethereum changed to a Proof of Stake consensus paradigm, which key component of the Proof of Work process would be eliminated?

A.

There would be no need for the miners or nodes to perform a guessing game

B.

The need to solve Byzantine Fault Tolerance

C.

All fees related to transactions would be removed

D.

The blockchain network would no longer have to display public transactions

Full Access
Question # 10

To approve pending ledger transactions, consensus algorithms often implement:

A.

Byzantine Fault Tolerance

B.

Access Control

C.

Kerckhoffs’s Principle

D.

Common Weakness Enumeration

Full Access
Question # 11

You are considering a cryptocurrency and for your privacy and anonymity are number one priority.

Which cryptocurrency should you likely use?

A.

Monero

B.

Bitcoin

C.

Dash

D.

Shadowcoin

E.

Litecoin

Full Access
Question # 12

The word “Drapp” or “DApp” is most commonly understood to mean what?

A.

Distributed Application

B.

Distributed Apps and Programs

C.

Decentralized Application

D.

Distributed Autonomous Application

Full Access
Question # 13

You are considering writing smart contracts and there are a few different languages you can consider. (Select two.)

A.

Truffle

B.

Serpent

C.

Solidity

D.

Embark

Full Access
Question # 14

One consideration that should be taken into account when building a product on a public blockchain is:

A.

Blockchain fees associated with transactions that both the product and the user may have in order to use the product on that blockchain

B.

What countries the blockchain is available in

C.

How you can transfer your tokens to another blockchain if you decide to switch

D.

How often the blockchain goes offline for maintenance

Full Access
Question # 15

Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

A.

Neo Generals’ problem

B.

Byzantine Generals’ problem

C.

Byzantine Admirals’ problem

D.

Renaissance Generals’ problem

Full Access
Question # 16

In common blockchain design, blockchain addresses or “accounts” are generated by:

A.

A PRNG output guaranteed to be unique

B.

A server/node timestamp added to a PRNG output

C.

Creating a hash based on a cryptographic public key and various meta data

D.

The most recent block height hash combined with a cryptographic private key

Full Access
Question # 17

When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)

A.

Block Ciphers

B.

Rivest-Shamir-Adleman algorithm aka the RSA.

C.

Stream Ciphers

D.

Elliptical Curve Cryptography

Full Access
Question # 18

Proof of Stake offers which advantage over Proof of Work?

A.

Greater transaction speed

B.

It is compatible with new generation chipsets

C.

It has a longer history and deeper knowledge base

D.

None of the above

Full Access
Question # 19

__________ is a real-time gross settlement system (RTGS), currency exchange and remittance network by __________

A.

Ripple, Ripple

B.

Ripple, JP Morgan

C.

XRP, Ripple

D.

Ripple, XRP

Full Access
Question # 20

What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

A.

51% Attacks

B.

Tether Token Hack

C.

DDoS Attack

D.

BIP attack

E.

Parity Wallet Attack

Full Access
Question # 21

Consider the following scenario: A solo app developer wants to create their own cryptocurrency and build a blockchain based that allows users to buy and sell second-hand items with that cryptocurrency from each other. Before the transaction is considered complete, the purchaser must put the funds in an escrow service and the sender must enter the courier tracking number into that same escrow. Time is of the essence and this developer doesn’t want to worry about networking of infrastructure. This app must be fully autonomous or “decentralized”.

Which architecture would best solve the product need?

A.

Ethereum for token creation and escrow service; User-facing features built with web technologies and deployed through IPFS

B.

Ethereum for token creation; Traditional multitier API and database for escrow service; User-facing features built in web technologies then minified unto a String and deployed to an Ethereum Smart Contract

C.

Hyperledger Fabric for the escrow service and token creation using chaincode; User-facing features built with Hyperledger Composer

D.

The product cannot be built. Fully decentralized apps are not yet possible for user interface

Full Access
Question # 22

Blockchains only work to store financial transactions or other exchanges of monetary value.

A.

TRUE

B.

FALSE

Full Access
Question # 23

What consensus algo uses a method of sending coins to an address where they cannot be retrieved?

A.

Proof of Stake

B.

Proof of Activity

C.

Proof of Burn

D.

Proof of Sending

Full Access
Question # 24

In public key cryptography, the private key is used to:

A.

Encrypt the public key

B.

Generate unique hash values each time it is used

C.

Verify the digital signature of a public key

D.

Sign/approve any transaction/action that might be made by the holder of the key pair

Full Access
Question # 25

Gas has multiple associated terms with it: Gas Prices, Gas Cost, Gas Limit, and Gas Fees. The principle behind Gas is to have a stable value for how much a transaction or computation costs on the Ethereum network.

Which is considered to be the static value for how much a computation costs in terms of Gas?

A.

Price

B.

Fee

C.

Cost

D.

Limit

Full Access
Question # 26

Which scenario would it be most appropriate for a blockchain solution to implement a Proof of Work or Proof of Stake consensus?

A.

When the blockchain needs to be permissioned

B.

When the aim of the blockchain is to be a trustless as possible

C.

When the blockchain needs to support millions of transactions

D.

All of the above

Full Access
Question # 27

In what year did a whitepaper that was published by “Satoshi Nakamoto” outlined a solution to the Byzantine Generals problem?

A.

2006

B.

2009

C.

2008

D.

2010

Full Access
Question # 28

Your customer is an enterprise that is focused on financial sectors.

What type of blockchain would this customer likely want specified for their enterprise?

A.

Permissionless

B.

Decentralized

C.

Hybrid

D.

Permissioned

Full Access
Question # 29

In Ethereum how is the block difficulty determined in Ethereum?

A.

The Block Difficulty increases when the time between mined blocks is below 10 seconds, while it decreases when the time is above 20 seconds.

B.

The Block Difficulty is determined by the Ethereum Committee every fortnight to reflect the average amount of transaction and it cannot be influenced by the network itself.

C.

The Block Difficulty increases when the time between mined blocks is below 20 seconds, while it decreases when the tie is above 60 seconds.

Full Access
Question # 30

Fabric Ledger has two specific parts. Select answer with the proper two parts.

A.

State Data, Transactional Data

B.

State Data, Transaction logs

C.

LevelIDb, CouchDB

D.

Transaction Logs, CouchDB

Full Access
Question # 31

Blockchain provenance is defined as _______________?

A.

Information sent to the blockchain and written to the blockchain.

B.

Recording the history of data, from its last block to various stages of the data lifecycle

C.

Recording the history of data, from its inception to various stages of the data lifecycle.

D.

Once a transaction has been written and committed to the ledger it cannot be changed.

Full Access
Question # 32

Public blockchains can alter the blockchain ledger by:

A.

Creating a hard fork of the blockchain data, tooling and/or software

B.

Achieving community consensus via a Smart Contract to update the ledger

C.

Re-hashing the blocks from the total block height down to the genesis block

D.

Blockchain ledgers are immutable and can never be altered

Full Access
Question # 33

The first actual known blockchain software implementation and deployment occurred:

A.

In 1991 by Stuart Haber

B.

In 2011 Markus Persson

C.

In 2009 by Satoshi Nakamoto

D.

In 1991 by Linus Torvalds

Full Access
Question # 34

In the Ethereum EVM there are two types of memory areas. (Select two.)

A.

Storage

B.

Database

C.

Memory

D.

Persistent

E.

Ephemeral

Full Access