Latest CBSP Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : CBSP
Exam Name : BTA Certified Blockchain Security Professional
Vendor Name : "Blockchain"







CBSP Dumps CBSP Braindumps

CBSP Real Questions CBSP Practice Test CBSP Actual Questions


killexams.com Blockchain CBSP


BTA Certified Blockchain Security Professional


https://killexams.com/pass4sure/exam-detail/CBSP


Question: 11


The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.


  1. True

  2. False




Answer: A
Question: 12

Blockchain technology is designated to be self-contained with no interaction with external components.


  1. True

  2. False




Answer: B
Question: 13

Which types of network attacks focus on partitioning the blockchain network? Select all that apply


  1. Eclipse

  2. Sybil

  3. Denial of Service

  4. Routing




Answer: A,B,C
Question: 14

Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.


  1. True

  2. False




Answer: B
Question: 15

In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.


  1. True

  2. False




Answer: A
Question: 16

Properly encrypted data stored in the distributed ledger adequately protects data in both the short-term and the long- term


  1. True

  2. False




Answer: A
Question: 17

Which of the following is NOT a common regulatory requirement tor businesses?


  1. Data transparency

  2. Data encryption

  3. Personal data protection

  4. Data control




Answer: A
Question: 18

Which of the following biockchains uses a channel-focused architectural design?


  1. Hyperledger

  2. Corda

  3. Ethereum




Answer: A
Question: 19

The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network


  1. True

  2. False




Answer: B
Question: 20

Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.


  1. True

  2. False




Answer: A
Question: 21

Sidechains can benefit the mainchain in what ways? Select all that apply

  1. Speed

  2. Functionality

  3. Scalability

  4. Security




Answer: B,C
Question: 22

Which of the following blockchains has a built-in consensus algorithm?


  1. Ethereum

  2. Corda

  3. Hyperledger




Answer: A
Question: 23

Compromising blockchain accounts is beneficial to which of the following types ot attacks?


  1. 51% Attack

  2. Eclipse Attack

  3. Routing Attack

  4. Sybil Attack

  5. All of the above




Answer: D
Question: 24

In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?


  1. Selfish Mining Attack

  2. Long-Range Attack

  3. Double-Spend Attack

  4. 51% Attack




Answer: B
Question: 25

Spinning up a large number of temporary mining servers is likely part of what type of attack?


  1. Routing

  2. Denial of Service

  3. Sybil

  4. Eclipse




Answer: C

In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?


  1. Proof of Burn

  2. Proof of Work

  3. Proof of Stake

  4. Proof of Activity

  5. None of the above




Answer: A
Question: 27

Which of the following is designed to allow someone to prove they know a secret without revealing it?


  1. Confidential Transaction

  2. Ring Signature

  3. Zero-Knowledge Proof

  4. Stealth Address




Answer: C
Question: 28

Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?


  1. Proof of Stake

  2. Proof of Space

  3. Proof of Work

  4. Proof of Activity




Answer: C
Question: 29

This sample code is vulnerable to which of the following attacks? Select all that apply.


  1. Reentrancy

  2. Unchecked Return Values

  3. Arithmetic

  4. Race Conditions




Answer: A,B,D
Question: 30

If an attacker can find two values that hash to the same output what is it called?


  1. Match

  2. Intersection

  3. Collision



Answer: C