BLOCKCHAIN CBSP
Q: 1
Which of the following are good ways to get pseudo-random numbers for smart contracts?
Options
Q: 2
Malicious smart contracts can potentially infect the nodes running the blockchain software
Options
Q: 3
Digital signatures provide confidentially, integrity , and non-repudiation.
Options
Q: 4
Compromising blockchain accounts is beneficial to which of the following types ot attacks?
Options
Q: 5
Which of the following attacks takes advantage of the fact that transaction information is posted on
the blockchain to infer sensitive information?
Options
Q: 6
The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its
vulnerability to traditional Denial of Service attacks
Options
Q: 7
Which types of network attacks focus on partitioning the blockchain network? Select all that apply
Options
Q: 8
Checkpointing is designed to protect against an attacker exploiting the mechanism by which
blockchain resolves divergent chains
Options
Q: 9
Properly encrypted data stored in the distributed ledger adequately protects data in both the short-
term and the long-term
Options
Q: 10
A major advantage of a stale channel is that it provides a permanent means of transferring value
between two parties.
Options
Question 1 of 10