Exam Code : CBSP
Exam Name : BTA Certified Blockchain Security Professional
Vendor Name :
"Blockchain"
CBSP Dumps CBSP Braindumps
CBSP Real Questions CBSP Practice Test CBSP Actual Questions
killexams.com Blockchain CBSP
BTA Certified Blockchain Security Professional
https://killexams.com/pass4sure/exam-detail/CBSP
The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.
True
False
Blockchain technology is designated to be self-contained with no interaction with external components.
True
False
Which types of network attacks focus on partitioning the blockchain network? Select all that apply
Eclipse
Sybil
Denial of Service
Routing
Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.
True
False
In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.
True
False
Properly encrypted data stored in the distributed ledger adequately protects data in both the short-term and the long- term
True
False
Which of the following is NOT a common regulatory requirement tor businesses?
Data transparency
Data encryption
Personal data protection
Data control
Which of the following biockchains uses a channel-focused architectural design?
Hyperledger
Corda
Ethereum
The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network
True
False
Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.
True
False
Sidechains can benefit the mainchain in what ways? Select all that apply
Speed
Functionality
Scalability
Security
Which of the following blockchains has a built-in consensus algorithm?
Ethereum
Corda
Hyperledger
Compromising blockchain accounts is beneficial to which of the following types ot attacks?
51% Attack
Eclipse Attack
Routing Attack
Sybil Attack
All of the above
In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?
Selfish Mining Attack
Long-Range Attack
Double-Spend Attack
51% Attack
Spinning up a large number of temporary mining servers is likely part of what type of attack?
Routing
Denial of Service
Sybil
Eclipse
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?
Proof of Burn
Proof of Work
Proof of Stake
Proof of Activity
None of the above
Which of the following is designed to allow someone to prove they know a secret without revealing it?
Confidential Transaction
Ring Signature
Zero-Knowledge Proof
Stealth Address
Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?
Proof of Stake
Proof of Space
Proof of Work
Proof of Activity
This sample code is vulnerable to which of the following attacks? Select all that apply.
Reentrancy
Unchecked Return Values
Arithmetic
Race Conditions
If an attacker can find two values that hash to the same output what is it called?
Match
Intersection
Collision