View Mode
Q: 1
Which of the following are good ways to get pseudo-random numbers for smart contracts?
Options
Q: 2
Malicious smart contracts can potentially infect the nodes running the blockchain software
Options
Q: 3
Digital signatures provide confidentially, integrity , and non-repudiation.
Options
Q: 4
Compromising blockchain accounts is beneficial to which of the following types ot attacks?
Options
Q: 5
Which of the following attacks takes advantage of the fact that transaction information is posted on the blockchain to infer sensitive information?
Options
Q: 6
The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its vulnerability to traditional Denial of Service attacks
Options
Q: 7
Which types of network attacks focus on partitioning the blockchain network? Select all that apply
Options
Q: 8
Checkpointing is designed to protect against an attacker exploiting the mechanism by which blockchain resolves divergent chains
Options
Q: 9
Properly encrypted data stored in the distributed ledger adequately protects data in both the short- term and the long-term
Options
Q: 10
A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE