0% found this document useful (0 votes)
73 views

Sampletest Blockchain

Hash function is a function that maps any sized data to a fixed size. Consensus ensures that the data is tamper proof and that local copies are consistent and updated. Blockchains function like ledgers by holding a record of all transactions that have ever occurred on a network.

Uploaded by

Vishal Manocha
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

Sampletest Blockchain

Hash function is a function that maps any sized data to a fixed size. Consensus ensures that the data is tamper proof and that local copies are consistent and updated. Blockchains function like ledgers by holding a record of all transactions that have ever occurred on a network.

Uploaded by

Vishal Manocha
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

 

Hash function is a function that map any sized data to a fixed size
2/2

true
 
False

 
What are the primary assumptions behind a permissioned blockchain network?
2/2

No need of consensus
Users are known a priori
 
Users are not malicious
The network is open

 
Consensus ensures:
2/2

The data needs to be tamper proof


The local copies are consistent and updated
 
Fast and Scalability
Privacy and authenticity

 
How do blockchains function like ledgers?
2/2

They hold a record of all transactions that have ever occurred on a network
 
They hold vast amounts of transaction data as a centralized database
They periodically update all balances of each wallet to the blockchain.
All of the above

 
After ___________Minutes a new block is formed in Bitcoin  that contains latest
transactions
2/2

10 mins
 
30mins
60 mins
120 mins

 
When a record is on a public blockchain, who can access it?
2/2

Multiple people simultaneously


 
One person at a time
Only the people involved in the transaction
Only the authorized person

 
What are the main cryptographic concepts in blockchain
3/3

Hashing and public key


Private key and digital signature
Hashing and digital signature
 
OTP and hashing

 
If No of participants increases in the bitcoin network then
3/3

Difficulty decreases
Difficulty increases
 
Difficulty remains same
All the wrong

 
With mining pools in effect, which of the following problem or problems may appear in
the Bit Coin network:
3/3

Monopoly in mining
 
Miners will get less reward
Discouragement among miners to fully complete the task posed by the network
There are other disadvantages with this scheme

 
In the permissioned blockchain – You do not record your identity while participating in
the consensus system
3/3

true
False
 
 
Block header contains
3/3

Previous block hash


Timestamp
Merkle root
All of the above
 
 
Which of the following is a wrong statement about a cryptographic hash function:
5/5

given the same message the hash function would return the same hash
it is difficult to generate the original message if we apply hash function on it.
a small change in the message does not impact the hash
 
it is difficult to find two different messages with same hash

 
What is the task of miners in a permission less blockchain network?
5/5

Miners act as a single third party to aggregate records and provide trust in the network by the
miners’ authority.
Miners are computers that allow access to the blockchain, ensuring the number of corrupt
nodes will stay low.
Miners are nodes that compete for a reward by calculating the correct nonce to make a
transaction possible.
 
Miners determine the consensus rules that should be followed and interfere when these rules
are broken.

 
Which characteristic of a blockchain network is also its protection?
5/5
The greater the number of full independent nodes, the harder it is to compromise the data in the
blockchain.
 
The lower the number of miners in the blockchain, the higher the incentive is for securing the
network.
The more centralized the control of the blockchain is, the harder to secure the data and avoid
fraud.
The more complicated consensus algorithm, the more rewarding it is to secure the network.

 
In which of the following scenarios Blockchain based solution is suggested?
5/5

High no of transactions
Need of storing non transactional data
Multiple stakeholders for handling of digital asset and also control of functionality
 
transactions between trusted parties in financial market

Questions Set
41 of 43 points
Choose the most appropriate Option for each Question

 
What is an example of the use of cryptography in a blockchain?
0/2

Accessing private or hybrid blockchains by using a private key


Creating cryptocurrency as a reward for mining nodes
Keeping blockchains secure from 51% attacks by corrupt nodes
Securing transfers of cryptocurrency between recipients
 
Correct answer
Accessing private or hybrid blockchains by using a private key

 
____________first proposed the concept of Bitcoin
2/2

Harber&Stornetta
VitalikButerin
IBM
Satoshi Nakamoto
 
 
What is used to store the bitcoins?
2/2

Bank account
Pocket
Wallet
 
All of the above

 
The current cryptographic hash algorithm used in Bitcoin is:
2/2

RSA
MD5
SHA128
SHA256
 
 
Which algorithm is used to generate digital signature in Bitcoin?
3/3

MD5
SHA256
SHA 512
ECDSA
 
 
The first block in a blockchain is called
2/2

Geneous Block
FIRST BLOCK
INITIAL BLOCK
Genesis Block
 
 
 Which is not included in the metadata of a Block header
3/3

Timestamp
Merkle root
Transactions
 
Previous block hash

 
A procedure to reach in a common agreement in a distributed or decentralized multi-
agent platform is called
3/3

Smart contracts
Consensus
 
Blockchain
Hyperledger

 
A block in blockchain is pointed using:
3/3

Hash pointer
 
Block pointer
Key pointer
Public-Private Key

 
Which of the following is used to ensure consensus in Bitcoin framework?
2/2

PoW (Proof of Work)


 
PoS (Proof of Stake)
PoC (Proof of Concept)
None of the Above

 
What does non-repudiation mean in terms of security considerations in blockchain
platform?
5/5

A logic is executed only after it is requested by an authorized entity


Correct and consistent transactions
Entities cannot deny transactions they have performed
 
None of the above

 
Attacker attempts to fill the network with the clients under its control is called _______
5/5

Double spending
Sybil Attack
 
Ransom Attack
DOS attack

 
With mining pools in effect, which of the following problem or problems may appear in
the Bit Coin network:
3/3

Monopoly in mining
 
Miners will get less reward
Discouragement among miners to fully complete the task posed by the network
There are other disadvantages with this scheme

 
What is a fork?
2/2

The copy of a block


The creation of an alternative version of a blockchain
 
The creation of a new distributed ledger
The copy of a cryptocurrency wallet

 
What are the different types of blockchain?
2/2

Public, private, generic


Public, secret, consortium
Generic, secret, consortium
Public, private, consortium
 
 
What is the name of blue coloured block in a blockchain?
2/2
Mainchain Block
Genesis Block
Winner Block
Orphane Block

You might also like