CBSP Dumps CBSP Braindumps

CBSP Real Questions CBSP Practice Test CBSP Actual Questions


killexams.com Blockchain CBSP


BTA Certified Blockchain Security Professional


https://killexams.com/pass4sure/exam-detail/CBSP

Question: 11


The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.


  1. True

  2. False


Answer: A Question: 12

Blockchain technology is designated to be self-contained with no interaction with external components.


  1. True

  2. False


Answer: B Question: 13

Which types of network attacks focus on partitioning the blockchain network? Select all that apply


  1. Eclipse

  2. Sybil

  3. Denial of Service

  4. Routing


Answer: A,B,C Question: 14

Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.


  1. True

  2. False


Answer: B Question: 15

In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.


  1. True

  2. False


Answer: A Question: 16

Properly encrypted data stored in the distributed ledger adequately protects data in both the short-term and the long- term


  1. True

  2. False


Answer: A Question: 17

Which of the following is NOT a common regulatory requirement tor businesses?


  1. Data transparency

  2. Data encryption

  3. Personal data protection

  4. Data control


Answer: A Question: 18

Which of the following biockchains uses a channel-focused architectural design?


  1. Hyperledger

  2. Corda

  3. Ethereum


Answer: A Question: 19

The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network


  1. True

  2. False


Answer: B Question: 20

Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.


  1. True

  2. False


Answer: A Question: 21

Sidechains can benefit the mainchain in what ways? Select all that apply

  1. Speed

  2. Functionality

  3. Scalability

  4. Security


Answer: B,C Question: 22

Which of the following blockchains has a built-in consensus algorithm?


  1. Ethereum

  2. Corda

  3. Hyperledger


Answer: A Question: 23

Compromising blockchain accounts is beneficial to which of the following types ot attacks?


  1. 51% Attack

  2. Eclipse Attack

  3. Routing Attack

  4. Sybil Attack

  5. All of the above


Answer: D Question: 24

In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?


  1. Selfish Mining Attack

  2. Long-Range Attack

  3. Double-Spend Attack

  4. 51% Attack


Answer: B Question: 25

Spinning up a large number of temporary mining servers is likely part of what type of attack?


  1. Routing

  2. Denial of Service

  3. Sybil

  4. Eclipse


Answer: C

In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?


  1. Proof of Burn

  2. Proof of Work

  3. Proof of Stake

  4. Proof of Activity

  5. None of the above


Answer: A Question: 27

Which of the following is designed to allow someone to prove they know a secret without revealing it?


  1. Confidential Transaction

  2. Ring Signature

  3. Zero-Knowledge Proof

  4. Stealth Address


Answer: C Question: 28

Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?


  1. Proof of Stake

  2. Proof of Space

  3. Proof of Work

  4. Proof of Activity


Answer: C Question: 29

This sample code is vulnerable to which of the following attacks? Select all that apply.


  1. Reentrancy

  2. Unchecked Return Values

  3. Arithmetic

  4. Race Conditions


Answer: A,B,D Question: 30

If an attacker can find two values that hash to the same output what is it called?


  1. Match

  2. Intersection

  3. Collision

Answer: C