Filters
Question type

Study Flashcards

Select the best statement for determining how consensus is reached.


A) By the miner nodes which make sure that a transaction is valid.
B) By a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
C) By every single node in the blockchain network different transactions.
D) By every single node in the blockchain network executing the same transaction.

Correct Answer

verifed

verified

An on-chain Smart Contract might be considered autonomous in nature because:


A) It is difficult to alter or update
B) Once it is deployed, it can never be revoked
C) Once it is deployed, it is self-managing
D) All of the above

Correct Answer

verifed

verified

Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda. What is the best answer?


A) R3 Corda is a pluggable blockchain and allows the enterprise flexibility
B) R3 Corda is a byzantine fault tolerant blokchain
C) R3 Corda is a proof of stake based blockchain
D) R3 Corda is a proof of work based blockchain

Correct Answer

verifed

verified

Proof of Stake offers which advantage over Proof of Work?


A) Greater transaction speed
B) It is compatible with new generation chipsets
C) It has a longer history and deeper knowledge base
D) None of the above

Correct Answer

verifed

verified

You are currently consulting with an organization that ships widgets overseas. They would like to implement a Hyperledger Fabric and would like to know about how to use cryptocurrencies with Hyperledger Fabric. What is the best answer?


A) If they need a native currency for their chain network, they can develop their own native currency with chaincode.
B) Hyperledger Fabric can be integrated with any crypto currency by using the proper APIs.
C) If they need a native currency for their chain network, they must use Ripple currency with chaincode.
D) If they need a native currency for their chain network, they must use Ethereum currency with chaincode.
E) Hyperledger Fabric does not support cryptocurrencies.

Correct Answer

verifed

verified

Blockchains only work to store financial transactions or other exchanges of monetary value.

Correct Answer

verifed

verified

Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes) . Select best answer.


A) NSA is spying on us so what's it matters.
B) Depends on input
C) false
D) true

Correct Answer

verifed

verified

The reason that cryptocurrencies such as Bitcoin, Ethereum and Litecoin can be exchanged one with another is due to the fact that they all operate on the same blockchain network

Correct Answer

verifed

verified

What is another name for blockchains that run adjacent to the blockchains and also offer more scope for processing contracts?


A) Adchains
B) Funnelchains
C) Multichains
D) Sidechains

Correct Answer

verifed

verified

In Ethereum the difficulty adjustment algorithm is coded in the ___________ file.


A) calcDifficultyFrontier
B) block_validator.go
C) calcDifficultyHomestead
D) calcDifficultyvalidator.go

Correct Answer

verifed

verified

In public key cryptography, the private key is used to:


A) Encrypt the public key
B) Generate unique hash values each time it is used
C) Verify the digital signature of a public key
D) Sign/approve any transaction/action that might be made by the holder of the key pair

Correct Answer

verifed

verified

In Proof of Work group consensus, the "nonce" refers to?


A) The random data to be combined with the block data which will produce a hash output matching the current difficulty level
B) Random nonsense data inserted at the end of a block to fill it completely
C) The average Bitcoin price over the last 90 days
D) None of the above

Correct Answer

verifed

verified

______ is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain.


A) Mist
B) Mix
C) Truffle
D) Metamask
E) Embark

Correct Answer

verifed

verified

In the Proof of Stake(POS) algorithm the miners are really known as ___________?


A) Notary
B) Oracle
C) Forgers
D) Minters

Correct Answer

verifed

verified

Which of the following hashing algos is considered to be the strongest?


A) RSA
B) SHA-2
C) AES
D) MD-5
E) SHA

Correct Answer

verifed

verified

You would like to run Ethereum DApps in a browser without a node. (No need to download blockchain.) What could you use locally in your Chrome browser?


A) Jaxx
B) Solidity
C) Metamask
D) Mist

Correct Answer

verifed

verified

When a blockchain software is updated with new functionality that breaks or modifies the rules of the previous version of the software, what has just occurred?


A) A hard fork
B) Revision Reversal Attack
C) A software fault
D) Autonomous update consensus

Correct Answer

verifed

verified

Which of the following blockchain is NOT a permissioned blockchain?


A) Quantum
B) Ethereum
C) R3 Corda
D) Ripple
E) Hyperledger

Correct Answer

verifed

verified

What benefit does HPE Cloud Cruiser provide?


A) Need for proven, production-ready technology
B) Need a full history of all application data
C) Require top-notch performance
D) Need to avoid data duplication or redundancy

Correct Answer

verifed

verified

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________. What is required?


A) Consensus
B) Crypthography
C) Bandwidth
D) Availability

Correct Answer

verifed

verified

Showing 81 - 100 of 212

Related Exams

Show Answer