March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Blockchain CBSP Dumps

Page: 1 / 3
Total 91 questions

BTA Certified Blockchain Security Professional Questions and Answers

Question 1

Which of the following is NOT an essential part of Confidential Transactions?

Options:

A.

Zero-Knowledge Proof

B.

Ring Signature

C.

Elliptic Curve Cryptography

D.

Pederson Commitment

Question 2

From a business perspective, which of me following is the major consideration regarding the use of smart contract technology?

Options:

A.

Public Accessibility

B.

Hosting Requirements

C.

Code as Law" Arbitration

D.

Decentralization

Question 3

Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.

Options:

A.

Scale

B.

Efficiency

C.

Access Control

D.

Decentralization

Question 4

Data subject to deletion procedures should be stored encrypted on-chain.

Options:

A.

True

B.

False

Question 5

Which of the following does NOT rely on the security of public key cryptography?

Options:

A.

Stealth Address

B.

Confidential Transaction

C.

Ring Signature

D.

Zero-Knowledge Proof

Question 6

Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to be considered untrusted due to random chance.

Options:

A.

True

B.

False

Question 7

This sample code is vulnerable to which of the following attacks?

Options:

A.

Denial of Service

B.

Access Control

C.

Race Conditions

D.

Anthmetic

E.

All of the above

Question 8

Which of the following blockchains uses a channel-focused architectural design?

Options:

A.

Ethereum

B.

Corda

C.

Hyperledger

Question 9

Which of the following blockchains best implements need-to-know tor blockchain data?

Options:

A.

Ethereum

B.

Corda

C.

Hyperledger

Question 10

The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its vulnerability to traditional Denial of Service attacks

Options:

A.

True

B.

False

Question 11

Which of the following features were exploited as part of the Verge cryptocurrency hack? Select all that apply.

Options:

A.

Mining Difficulty Update Function

B.

Multiple Hash Functions

C.

Timestamp Flexibility

D.

Short Addresses

Question 12

Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.

Options:

A.

True

B.

False

Question 13

Ring signatures are designed to do which of the following?

Options:

A.

Conceal transaction amount

B.

Conceal transaction recipient

C.

Conceal shared secret

D.

Conceal transaction sender

Page: 1 / 3
Total 91 questions