Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.
Which types of network attacks focus on partitioning the blockchain network? Select all that apply
Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.
For which of the following attacks is a permissioned or private blockchain the best solution?
The List hack demonstrated that biockchains using short addresses are exploitable
Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?
A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.
Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data
Which of the following blockchains does NOT tie real-world identity to public keys on the blockchain?
Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built in from the beginning
This sample code is vulnerable to which of the following attacks? Select all that apply.
Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
Spinning up a large number of temporary mining servers is likely part of what type of attack?
This sample code is vulnerable to which of the following attacks? Select all that apply.
The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms
The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network
Which of the following is designed to allow someone to prove they know a secret without revealing it?