Blockchain cbsa practice test

BTA Certified Blockchain Solution Architect Exam


Question 1

If a hard fork occurs on a public blockchain software and 20 running nodes choose not to update,
what can be said about those 20 nodes?

  • A. They are effectually now operating on a different blockchain network than the nodes that updated
  • B. They are considered “out of compliance”
  • C. They are flagged for removal from the network and can no longer collect fees
  • D. They are unable to achieve consensus
Answer:

A

Discussions

Question 2

What is the accepted best practice for preventing contract addresses from changing when a new
contract is released?

  • A. Move your contract to a new blockchain
  • B. Delete the old contract and add the new version in its place
  • C. Addresses always change so use a calling contract
  • D. Use the “- -addressForce” parameter when releasing a new contract
Answer:

D

Discussions

Question 3

In common blockchain design, which data structure is used to create a lightweight digital fingerprint
of all the transactions within a block?

  • A. Blockchains are unique in that they utilize no data structures
  • B. Lexicographic Search Tree
  • C. Bloom Filter
  • D. Merkle Tree
Answer:

D

Discussions

Question 4

Proof of Stake consensus is most often needed for and implemented by:

  • A. Blockchain networks with low traffic
  • B. Permissioned blockchains
  • C. Blockchains that manage wealth and assets
  • D. Public blockchains
Answer:

C

Discussions

Question 5

Transactions can only be added to a blockchain.

  • A. TRUE
  • B. FALSE
Answer:

A

Discussions

Question 6

To prevent duplicate addresses/accounts from being generated on the same blockchain network, the
input of the hash function that generates the address:

  • A. Should never be plain text
  • B. Should always be numerical
  • C. Should first be encrypted
  • D. Should contain enough entropy or randomness
Answer:

D

Discussions

Question 7

To determine the anticipated load on an application, the number of end users should be considered
along with?

  • A. The location of the user
  • B. The average number of transactions per user
  • C. The average age of the user
  • D. The average bandwidth speed of the user
Answer:

B

Discussions

Question 8

In public key cryptography, the private key is used to:

  • A. Encrypt the public key
  • B. Generate unique hash values each time it is used
  • C. Verify the digital signature of a public key
  • D. Sign/approve any transaction/action that might be made by the holder of the key pair
Answer:

D

Discussions

Question 9

Records on a public blockchain are deleted by?

  • A. They cannot be deleted
  • B. Filing a request with the Ethereum Foundation
  • C. Recalling the transaction of Etherscan.io
  • D. Deleting the transaction from the app that sent it
Answer:

A

Discussions

Question 10

The two main types of transactions you can perform in Hyperledger Fabric are:

  • A. Chaincode Read and Chaincode Write transactions
  • B. Deploy and Invoke transactions
  • C. HFRead and HFAppend transactions
  • D. Call and Write transactions
Answer:

B

Discussions
To page 2