Sampletest Blockchain
Sampletest Blockchain
Hash function is a function that map any sized data to a fixed size
2/2
true
False
What are the primary assumptions behind a permissioned blockchain network?
2/2
No need of consensus
Users are known a priori
Users are not malicious
The network is open
Consensus ensures:
2/2
How do blockchains function like ledgers?
2/2
They hold a record of all transactions that have ever occurred on a network
They hold vast amounts of transaction data as a centralized database
They periodically update all balances of each wallet to the blockchain.
All of the above
After ___________Minutes a new block is formed in Bitcoin that contains latest
transactions
2/2
10 mins
30mins
60 mins
120 mins
When a record is on a public blockchain, who can access it?
2/2
What are the main cryptographic concepts in blockchain
3/3
If No of participants increases in the bitcoin network then
3/3
Difficulty decreases
Difficulty increases
Difficulty remains same
All the wrong
With mining pools in effect, which of the following problem or problems may appear in
the Bit Coin network:
3/3
Monopoly in mining
Miners will get less reward
Discouragement among miners to fully complete the task posed by the network
There are other disadvantages with this scheme
In the permissioned blockchain – You do not record your identity while participating in
the consensus system
3/3
true
False
Block header contains
3/3
given the same message the hash function would return the same hash
it is difficult to generate the original message if we apply hash function on it.
a small change in the message does not impact the hash
it is difficult to find two different messages with same hash
What is the task of miners in a permission less blockchain network?
5/5
Miners act as a single third party to aggregate records and provide trust in the network by the
miners’ authority.
Miners are computers that allow access to the blockchain, ensuring the number of corrupt
nodes will stay low.
Miners are nodes that compete for a reward by calculating the correct nonce to make a
transaction possible.
Miners determine the consensus rules that should be followed and interfere when these rules
are broken.
Which characteristic of a blockchain network is also its protection?
5/5
The greater the number of full independent nodes, the harder it is to compromise the data in the
blockchain.
The lower the number of miners in the blockchain, the higher the incentive is for securing the
network.
The more centralized the control of the blockchain is, the harder to secure the data and avoid
fraud.
The more complicated consensus algorithm, the more rewarding it is to secure the network.
In which of the following scenarios Blockchain based solution is suggested?
5/5
High no of transactions
Need of storing non transactional data
Multiple stakeholders for handling of digital asset and also control of functionality
transactions between trusted parties in financial market
Questions Set
41 of 43 points
Choose the most appropriate Option for each Question
What is an example of the use of cryptography in a blockchain?
0/2
____________first proposed the concept of Bitcoin
2/2
Harber&Stornetta
VitalikButerin
IBM
Satoshi Nakamoto
What is used to store the bitcoins?
2/2
Bank account
Pocket
Wallet
All of the above
The current cryptographic hash algorithm used in Bitcoin is:
2/2
RSA
MD5
SHA128
SHA256
Which algorithm is used to generate digital signature in Bitcoin?
3/3
MD5
SHA256
SHA 512
ECDSA
The first block in a blockchain is called
2/2
Geneous Block
FIRST BLOCK
INITIAL BLOCK
Genesis Block
Which is not included in the metadata of a Block header
3/3
Timestamp
Merkle root
Transactions
Previous block hash
A procedure to reach in a common agreement in a distributed or decentralized multi-
agent platform is called
3/3
Smart contracts
Consensus
Blockchain
Hyperledger
A block in blockchain is pointed using:
3/3
Hash pointer
Block pointer
Key pointer
Public-Private Key
Which of the following is used to ensure consensus in Bitcoin framework?
2/2
What does non-repudiation mean in terms of security considerations in blockchain
platform?
5/5
Attacker attempts to fill the network with the clients under its control is called _______
5/5
Double spending
Sybil Attack
Ransom Attack
DOS attack
With mining pools in effect, which of the following problem or problems may appear in
the Bit Coin network:
3/3
Monopoly in mining
Miners will get less reward
Discouragement among miners to fully complete the task posed by the network
There are other disadvantages with this scheme
What is a fork?
2/2
What are the different types of blockchain?
2/2