Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Effective Study Techniques for the Blockchain CBSA Exam

Questions 11

How are blocks of data “chained” together to ensure the integrity of transactions?

Options:

A.

The hash of the previous block is written to the header of the current block

B.

The ID of the previous block is stored in the current block

C.

A public key is stored in each block for data decryption

D.

The hash of the genesis block is kept in all block headers

Buy Now
Questions 12

Which of these demonstrates the correct order of the lifecycle of a transaction on Ethereum blockchain?

Options:

A.

1. User uses Dapp/web3 to start transaction2. User signs the transaction with their private key3. Transaction validated on locally running node4. Transaction broadcast to entire network5. Miners choose to accept or pass on the transaction6. Miner takes each accepted transaction and writes it to the current block

B.

1. User uses Dapp/web3 to start transaction2. Transaction broadcast to entire network3. If accepted by the network, user signs transaction with private key4. Miners choose to accept or pass on the transaction5. Miner takes each accepted transaction and writes it to the current block

C.

Both of these ordering sequences can occur

D.

None of the above

Buy Now
Questions 13

Which of these reasons is a good reason to choose a conventional database over blockchain to store application data?

Options:

A.

Centralization is to be avoided

B.

Databases should never be used over blockchain

C.

Full history is needed for all data

D.

High performance is required

Buy Now
Questions 14

You have flown to NYC to have a discussion with a technical executive of a too big to fail bank. You are having a discussion about blockchain algos and the customer is asking what are some disadvantages of using a POW algo?

Options:

A.

Centralization of blockchain control

B.

Only use case for computational power is blockchain

C.

Large expenditures for computational power

D.

Not profitable for miners

E.

51% attack mitigation

Buy Now
Questions 15

What type of "bug" generally occurs when something isn’t right according to business requirements?

Options:

A.

Business logic

B.

Business Requirements

C.

Integration

D.

Accessibility

E.

Security

Buy Now
Questions 16

Records on a public blockchain are deleted by?

Options:

A.

They cannot be deleted

B.

Filing a request with the Ethereum Foundation

C.

Recalling the transaction of Etherscan.io

D.

Deleting the transaction from the app that sent it

Buy Now
Questions 17

When considering a new ERC20 token its best to consider using ____________________.

Options:

A.

Use a template from AWS

B.

Audited Implementation

C.

Start a new one

D.

Copy from existing token

Buy Now
Questions 18

Which types of data are able to be stored on any given blockchain ledger?

Options:

A.

Each blockchain software specifies its own data storage rules

B.

Any data that is within the UTC-8 standard

C.

Unencrypted textual and numerical data

D.

Encrypted textual and numerical data

Buy Now
Questions 19

Which of the following is considered the most popular public key encryption algorithm?

Options:

A.

RSA

B.

AES

C.

MD5

D.

PGP

Buy Now
Questions 20

By design, permissioned blockchains such as Hyperledger Fabric are not capable of creating or utilizing cryptocurrency.

Options:

A.

FALSE

B.

TRUE

Buy Now