Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CBSP Sample Questions Answers

Questions 4

Which of the following blockchains uses a channel-focused architectural design?

Options:

A.

Ethereum

B.

Corda

C.

Hyperledger

Buy Now
Questions 5

Ring signatures are designed to do which of the following?

Options:

A.

Conceal transaction amount

B.

Conceal transaction recipient

C.

Conceal shared secret

D.

Conceal transaction sender

Buy Now
Questions 6

Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.

Options:

A.

Scale

B.

Efficiency

C.

Access Control

D.

Decentralization

Buy Now
Questions 7

Which types of network attacks focus on partitioning the blockchain network? Select all that apply

Options:

A.

Eclipse

B.

Sybil

C.

Denial of Service

D.

Routing

Buy Now
Questions 8

Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.

Options:

A.

True

B.

False

Buy Now
Questions 9

For which of the following attacks is a permissioned or private blockchain the best solution?

Options:

A.

Routing

B.

Denial of Service

C.

Replay

D.

Sybil

Buy Now
Questions 10

The List hack demonstrated that biockchains using short addresses are exploitable

Options:

A.

True

B.

False

Buy Now
Questions 11

Data subject to deletion procedures should be stored encrypted on-chain.

Options:

A.

True

B.

False

Buy Now
Questions 12

Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?

Options:

A.

Proof of Stake

B.

Proof of Space

C.

Proof of Work

D.

Proof of Activity

Buy Now
Questions 13

A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.

Options:

A.

True

B.

False

Buy Now
Questions 14

Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data

Options:

A.

True

B.

False

Buy Now
Questions 15

Which of the following blockchains does NOT tie real-world identity to public keys on the blockchain?

Options:

A.

Hyperledger

B.

Ethereurn

C.

Corda

Buy Now
Questions 16

Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built in from the beginning

Options:

A.

True

B.

False

Buy Now
Questions 17

This sample code is vulnerable to which of the following attacks? Select all that apply.

Options:

A.

Unchecked Return Values

B.

Arithmetic

C.

Short Address

D.

Reentrancy

Buy Now
Questions 18

Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply

Options:

A.

Randomness

B.

Large State Space

C.

One-Way

D.

Non-Locality

Buy Now
Questions 19

What is the easiest way to steal cryptocurrency from a user?

Options:

A.

Private key theft

B.

Double-spend attack

C.

Consensus hijacking

D.

Eclipse attack

E.

None of the above

Buy Now
Questions 20

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply

Options:

A.

Bitcoin

B.

EOS

C.

Verge

D.

List

Buy Now
Questions 21

Spinning up a large number of temporary mining servers is likely part of what type of attack?

Options:

A.

Routing

B.

Denial of Service

C.

Sybil

D.

Eclipse

Buy Now
Questions 22

This sample code is vulnerable to which of the following attacks? Select all that apply.

Options:

A.

Reentrancy

B.

Unchecked Return Values

C.

Arithmetic

D.

Race Conditions

Buy Now
Questions 23

The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms

Options:

A.

True

B.

False

Buy Now
Questions 24

The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network

Options:

A.

True

B.

False

Buy Now
Questions 25

Which of the following is designed to allow someone to prove they know a secret without revealing it?

Options:

A.

Confidential Transaction

B.

Ring Signature

C.

Zero-Knowledge Proof

D.

Stealth Address

Buy Now
Questions 26

This sample code is vulnerable to which of the following attacks?

Options:

A.

Denial of Service

B.

Access Control

C.

Race Conditions

D.

Anthmetic

E.

All of the above

Buy Now
Questions 27

This sample code is vulnerable to which of the following attacks?

Options:

A.

Bad Randomness

B.

Reentrancy

C.

Arithmetic

D.

Unchecked Return Values

Buy Now
Exam Code: CBSP
Exam Name: BTA Certified Blockchain Security Professional
Last Update: Nov 30, 2024
Questions: 91
$66  $164.99
$50  $124.99
$42  $104.99
buy now CBSP