0% found this document useful (0 votes)
7 views

CBSA-Demo

Uploaded by

nojava6601
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

CBSA-Demo

Uploaded by

nojava6601
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Blockchain

CBSA Exam
CBSA

Questions & Answers


(Demo Version - Limited Content)

Thank you for Downloading CBSA exam PDF Demo

Get Full File:

https://www.dumpshero.com/cbsa-dumps-pdf/
Questions & Answers PDF Page 12

Version: 9.0

Question: 1
SHA-1 is the most commonly used SHA algorithm, and produces a -byte hash value(size).

A. 256
B. 128
C. 32
D. 20

Answer: D
Explanation:
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.

Question: 2
What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s
Blockchain where the majority of hashpower could possibly be controlled thru an attack?
What is the specific attack Bitcoin could be exposed to?

A. 51% Attacks
B. Tether Token Hack
C. DDoS Attack
D. BIP attack
E. Parity Wallet Attack

Answer: A

Question: 3
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)

A. 1,000,000,000,000,000,000
B. 1,000,000,000,000,000
C. 1,000,000,000
D. 10,000
E. 1,000,000,000,000

www.dumpshero.com
Questions & Answers PDF Page 3

Answer: A,B

Question: 4
In the Proof of Stake(POS) algorithm the miners are really known as ?

A. Notary
B. Oracle
C. Forgers
D. Minters

Answer: C
Explanation:
Proof of Stake has the same goal as proof of work—to validate transactions and achieve consensus in
the chain—and it uses an algorithm but with a different process. With proof of stake, the creator of a
new block “is chosen in a deterministic way, depending on its wealth, also defined as a stake.” Since
in a proof of stake system, there is no block reward, but the miners, known as forgers, get the
transaction fees. Proponents of this shift, including Ethereum co-founder Buterin, like proof of stake
for the energy and cost savings realized to get to a distributed form of consensus.

Question: 5
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that
requires .
What is required?

A. Consensus
B. Crypthography
C. Bandwidth
D. Availability

Answer: A
Explanation:
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require
consensus.

Question: 6
A cipher basically means it is using a fixed key which replaces the message with a
pseudorandom string of characters. It is basically the encryption of each letter one at a time.
What is the cipher type?

A. Stream

www.dumpshero.com
Questions & Answers PDF Page 4

B. Block
C. Parallel
D. RSA

Answer: A
Explanation:
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom
string of characters. It is basically the encryption of each letter one at a time.

Question: 7
You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the
plugin.
What is Etherscan used for?

A. A search engine that allows users to easily lookup, confirm and validate transaction that have
taken place on the Ethereum Blockchain
B. A search engine that allows users to easily lookup, confirm and validate transaction that have
taken place on the Bitcoin Blockchain
C. A search engine that allows users to easily lookup, confirm and validate transaction that have
taken place on the Ethereum and Tokens Blockchain
D. A search engine that allows users to easily lookup, confirm and validate transaction that have
taken place on any Blockchain

Answer: A
Explanation:
A search engine that allows users to easily lookup, confirm and validate transactions that have taken
place on the Ethereum Blockchain

Question: 8
What are two challenges with using a Proof of Work algorithm? (Select two.)

A. Mining pools not allowed


B. Difficulty rate goes done every year.
C. Expensive
D. Power Intensive

Answer: C,D

Question: 9
Your customer is an enterprise that is focused on financial sectors.

www.dumpshero.com
Questions & Answers PDF Page 5

What type of blockchain would this customer likely want specified for their enterprise?

A. Permissionless
B. Decentralized
C. Hybrid
D. Permissioned

Answer: D
Explanation:
Sometimes referred to as “private” blockchains, you are required to have some sort of permission to
access any or parts of that blockchain. There are a multitude of variants and hybrid
permissioned/permissionless blockchains that exist.

Question: 10
Which is the following is the metaphor that describes a logical dilemma that plagues many computer
networks?

A. Neo Generals’ problem


B. Byzantine Generals’ problem
C. Byzantine Admirals’ problem
D. Renaissance Generals’ problem

Answer: B
Explanation:
BFT is so-named because it represents a solution to the "Byzantine generals' problem," a logical
dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an
academic paper published in 1982

www.dumpshero.com
Thank You for trying CBSA PDF Demo

https://www.dumpshero.com/cbsa-dumps-pdf/

Start Your CBSA Preparation

[Limited Time Offer] Use Coupon " SAVE20 " for extra 20%
discount the purchase of PDF file. Test your
CBSA preparation with actual exam questions

www.dumpshero.com

You might also like