image


CBSA Dumps CBSA Braindumps

CBSA Real Questions CBSA Practice Test CBSA Actual Questions


BlockChain


CBSA


BTA Certified Blockchain Solution Architect


https://killexams.com/pass4sure/exam-detail/CBSA


Question: 187


What is a logic gate in electronics and computer science?

  1. A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be both 1 and 0.

  2. A logic gate usually takes in 3 inputs and gives out 2 output. The inputs and outputs are binary values, meaning they can be 1 or 0.

  3. A logic gate usually takes in 2 inputs and gives out 6 output. The inputs and outputs are binary values, meaning they can be both 1 and 0.

  4. A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0.


Answer: D


A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0. A XOR logic gate takes in 2 binary inputs and gives out a high output ONLY when the inputs are different. Meaning, if A and B are inputted to a XOR gate then the out C will be 1 ONLY when A is not equal toB. Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

Question: 188


Ethereum is considered to be a type of blockchain.

  1. Permissionless

  2. Permission Based

  3. Hybrid

  4. Private


Answer: A


Permissionless – anyone can join Anyone can run a node, run mining software/hardware, access a wallet and write data onto and transact within the blockchain

(as long as they follow the rules of the bitcoin blockchain). There is no way to censor anyone, ever, on the permissionless bitcoin blockchain.

Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095

Question: 189


Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda.

What is the best answer?

  1. R3 Corda is a pluggable blockchain and allows the enterprise flexibility

  2. R3 Corda is a byzantine fault tolerant blokchain

  3. R3 Corda is a proof of stake based blockchain

  4. R3 Corda is a proof of work based blockchain

Answer: A


Corda does not share the same requirements as Bitcoin: we require absolute certainty over transaction finality and we need to know who our counterparts are.

So we had the freedom – and took this opportunity – to solve the consensus problem in a different way. In particular, Corda solves the privacy issue in a number of manners, primarily by allowing for separation of consensus into a service which we call the Notary Cluster. Corda was designed for business from the start. It has no cryptocurrency built into the platform and does not require mining-style consensus, which imposes great cost with little business benefit.

Question: 190


Your customer is an enterprise that is focused on financial sectors. What type of blockchain would this customer likely want specified for their enterprise?

  1. Permissionless

  2. Decentralized

  3. Hybrid

  4. Permissioned


Answer: D


Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.

Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095

Question: 191


Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

  1. Neo Generals’ problem

  2. Byzantine Generals’ problem

  3. Byzantine Admirals’ problem

  4. Renaissance Generals’ problem


Answer: B


BFT is so-named because it represents a solution to the "Byzantine generals’ problem," a logical dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in 1982

Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058

Question: 192


The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key?

  1. TRUE

  2. FALSE


Answer: A


Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and- encrypting

Question: 193

A cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

  1. Stream

  2. Block

  3. Parallel

  4. RSA


Answer: A


Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/

Question: 194


You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin. What is Etherscan used for?

  1. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum Blockchain

  2. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Bitcoin Blockchain

  3. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum and Tokens Blockchain

  4. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on any Blockchain


Answer: A


A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum Blockchain

Reference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-

Question: 195


What are two challenges with using a Proof of Work algorithm? (Select two.)

  1. Mining pools not allowed

  2. Difficulty rate goes done every year.

  3. Expensive

  4. Power Intensive


Answer: CD


Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read

Question: 196


How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)

A. 1,000,000,000,000,000,000

B. 1,000,000,000,000,000

C. 1,000,000,000

D. 10,000

E. 1,000,000,000,000

Answer: AB


Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html

Question: 197


In the Proof of Stake(POS) algorithm the miners are really known as ?

  1. Notary

  2. Oracle

  3. Forgers

  4. Minters


Answer: C


Proof of Stake has the same goal as proof of work""to validate transactions and achieve consensus in the chain""and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum cofounder

Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus. Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read Question: 198


A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires . What is required?

  1. Consensus

  2. Crypthography

  3. Bandwidth

  4. Availability


Answer: A


A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. Reference: https://en.wikipedia.org/wiki/

Byzantine_fault_tolerance

Question: 199


SHA-1 is the most commonly used SHA algorithm, and produces a -byte hash value(size).

  1. 256

  2. 128

  3. 32

  4. 20


Answer: D


SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.

Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and- encrypting

Question: 200


What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain

where the majority of hashpower could possibly be controlled thru an attack? What is the specific attack Bitcoin could be exposed to?

  1. 51% Attacks

  2. Tether Token Hack

  3. DDoS Attack

  4. BIP attack

  5. Parity Wallet Attack


Answer: A


Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG