CBDE Dumps CBDE Braindumps

CBDE Real Questions CBDE Practice Test CBDE Actual Questions


killexams.com BlockChain CBDE


BTA Certified Blockchain Developer Ethereum


https://killexams.com/pass4sure/exam-detail/CBDE


Question: 91


What are Private Keys used for?

  1. To Protect the Public Keys by being cryptographically significant.

  2. To Sign Transactions And To Derive an Address From.

  3. To Generate An Address which can sign transactions.


Answer: B


Question: 92


Public Keys vs. Private Keys. Which statement is true?

  1. The Public Key is for Signing Transactions, the Private Key must be given out to verify the signature.

  2. The Private Key signs transactions, the Public Key can verify the signature.

  3. The Private Key is to generate a Public Key. The Public Key can sign transactions, the address is here to verify the transactions.


Answer: B


Question: 93


A Hashing Algorithm is deterministic. What does it mean?

  1. it always produces the same output given the same input.

  2. it uses equally distributed data to produce the output given a long input.

  3. it shouldn’t be possible to re-generate the input given the output.


Answer: A


Question: 94


DApps are:

  1. great, because they cut the middle man, run on a trusted platform, apply logic to the blockchain where already economic assets are running and thus allow peer to peer trade.

  2. an amazing way to create new applications. Those applications run entirely separated from other applications on the platform and allow for logical interactions. They can’t access any funds to add an additional layer of trust.

  3. a new way of applying logical operations for banks and big financial institutions. This way they can reduce the staff while operating at increased security.


Answer: B


Question: 95


To get most out of the blockchain, it is best:

  1. to use it for the whole business logic. It’s always best to have everything in once place.

  2. to use it only for things which need the benefits of the blockchain.

Answer: B


Question: 96


Which statement is true about the EVM?

  1. While the EVM is Sandboxed, it isn’t as powerful as the Bitcoin Network, because it’s not Turing Complete.

  2. The EVM can’t access hardware layers or anything outside a blockchain node because it’s sandboxed.

  3. The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.


Answer: C


Question: 97


Which is the right order for Denominations?

  1. Wei, Finney, Szabo, Ether, Tether.

  2. Finney, Szabo, Mether, Gwei.

  3. Gwei, Szabo, Finney, Ether.


Answer: C


Question: 98


The nonce-field in a transaction is used:

  1. to protect against replay attacks.

  2. to have an additional checksum for transactions.

  3. to sum up all ethers sent from that address.


Answer: A


Question: 99


Solidity gets compiled:

  1. to bytecode that can’t be understood by humans.

  2. to bytecodes which are essentially opcodes running instruction by instruction.


Answer: B


Question: 100


Having a bug-bounty program early on:

  1. can help to engage the community in testing your smart contracts and therefore help to find bugs early.

  2. might be a burden as it is an administrative overhead mainly.

  3. is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.


Answer: A

Question: 101


Consensus is reached:

  1. by the miner nodes which make sure that a transaction is valid.

  2. by every single node in the blockchain network executing the same transaction.

  3. by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.


Answer: B


Question: 102


Smart Contracts can be written in:

  1. Java, C++, Solidity and JavaScript, because the Ethereum Blockchain is completely language agnostic and cross compilers exist for every major language.

  2. Solidity, Viper, LLL and Serpent, because those are high level languages that are compiled down to bytecode.

  3. Solidity and JavaScript, because those are the official first implementations for Distributed applications and the Blockchain supports those languages fully.


Answer: B