Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its vulnerability to traditional Denial of Service attacks

A.

True

B.

False

Full Access
Question # 5

Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.

A.

True

B.

False

Full Access
Question # 6

Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to be considered untrusted due to random chance.

A.

True

B.

False

Full Access
Question # 7

Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.

A.

True

B.

False

Full Access
Question # 8

Which of the following blockchains does NOT tie real-world identity to public keys on the blockchain?

A.

Hyperledger

B.

Ethereurn

C.

Corda

Full Access
Question # 9

Multisignatures are designed to allow a set of users to make a valid transaction only if a set minimum number of them consent

A.

True

B.

False

Full Access
Question # 10

This sample code is vulnerable to which of the following attacks?

A.

Bad Randomness

B.

Reentrancy

C.

Arithmetic

D.

Unchecked Return Values

Full Access
Question # 11

Which of the following attacks only requires a single account and performs only normal blockchain operations?

A.

Replay Attack

B.

Routing Attack

C.

51% Attack

D.

Eclipse Attack

Full Access
Question # 12

The goal of most network-based blockchain attacks is to enable what type of attack?

A.

Selfish Mining Attack

B.

Double-Spend Attack

C.

51% Attack

D.

Long-Range Attack

Full Access
Question # 13

A blockchain-based solution best achieves which of the following goals?

A.

Data control

B.

Data deletion

C.

Data retention

D.

Data privacy

Full Access