CBSP Practice Test Questions

91 Questions


Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply


A. Bad Randomness


B. Short Addresses


C. Timestamp Dependence


D. Race Conditions





C.
  Timestamp Dependence

D.
  Race Conditions

The immutability of the blockchain is an asset for which of the following? Select all that apply.


A. Asset Management


B. Data Security Secure


C. Communications


D. Transparency





D.
  Transparency

Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.


A. True


B. False





B.
  False

Which of the following is a shared benefit of open and public blockchain architectures?


A. Decentralization


B. Scale


C. Efficiency


D. Access Control





A.
  Decentralization

For which of the following regulatory requirements is blockchain technology best suited?


A. Data Control


B. Data Retention


C. Transparency


D. Data Deletion





C.
  Transparency

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply


A. Bitcoin


B. EOS


C. Verge


D. List





C.
  Verge

D.
  List

All smart contracts are audited for correctness and checked for malicious code before being uploaded to the blockchain.


A. True


B. False





B.
  False

In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?


A. Proof of Burn


B. Proof of Work


C. Proof of Stake


D. Proof of Activity


E. None of the above





A.
  Proof of Burn

Which of the following biockchains uses a channel-focused architectural design?


A. Hyperledger


B. Corda


C. Ethereum





A.
  Hyperledger

For which of the following attacks is a permissioned or private blockchain the best solution?


A. Routing


B. Denial of Service


C. Replay


D. Sybil





D.
  Sybil

Which of the following is NOT a common regulatory requirement tor businesses?


A. Data transparency


B. Data encryption


C. Personal data protection


D. Data control





A.
  Data transparency

Which of the following does NOT rely on the security of public key cryptography?


A. Stealth Address


B. Confidential Transaction


C. Ring Signature


D. Zero-Knowledge Proof





D.
  Zero-Knowledge Proof


Page 1 out of 8 Pages