Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply
A. Bad Randomness
B. Short Addresses
C. Timestamp Dependence
D. Race Conditions
The immutability of the blockchain is an asset for which of the following? Select all that apply.
A. Asset Management
B. Data Security Secure
C. Communications
D. Transparency
Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.
A. True
B. False
Which of the following is a shared benefit of open and public blockchain architectures?
A. Decentralization
B. Scale
C. Efficiency
D. Access Control
For which of the following regulatory requirements is blockchain technology best suited?
A. Data Control
B. Data Retention
C. Transparency
D. Data Deletion
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
A. Bitcoin
B. EOS
C. Verge
D. List
All smart contracts are audited for correctness and checked for malicious code before being uploaded to the blockchain.
A. True
B. False
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?
A. Proof of Burn
B. Proof of Work
C. Proof of Stake
D. Proof of Activity
E. None of the above
Which of the following biockchains uses a channel-focused architectural design?
A. Hyperledger
B. Corda
C. Ethereum
For which of the following attacks is a permissioned or private blockchain the best solution?
A. Routing
B. Denial of Service
C. Replay
D. Sybil
Which of the following is NOT a common regulatory requirement tor businesses?
A. Data transparency
B. Data encryption
C. Personal data protection
D. Data control
Which of the following does NOT rely on the security of public key cryptography?
A. Stealth Address
B. Confidential Transaction
C. Ring Signature
D. Zero-Knowledge Proof
Page 1 out of 8 Pages |