blockchain cbsp practice test

BTA Certified Blockchain Security Professional

Last exam update: Dec 06 ,2025
Page 1 out of 7. Viewing questions 1-15 out of 91

Question 1

Implementing data access as a blockchain smart contract is a good solution for generating an audit
log of access to sensitive data

  • A. True
  • B. False
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 2

Malware infections of blockchain nodes can compromise the security of the blockchain's consensus
algorithm.

  • A. True
  • B. False
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 3

All smart contracts are audited for correctness and checked for malicious code before being
uploaded to the blockchain.

  • A. True
  • B. False
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 4

The decentralization of the blockchain makes it immune to traditional Denial of Service attacks

  • A. True
  • B. False
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 5

Which blockchain security control either risks centralization or permanently divergent chains?

  • A. Random Neighbor Selection
  • B. Permissioned Blockchains
  • C. Checkpoints
  • D. Private Blockchains
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following is NOT an essential part of Confidential Transactions?

  • A. Zero-Knowledge Proof
  • B. Ring Signature
  • C. Elliptic Curve Cryptography
  • D. Pederson Commitment
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which smart contract vulnerability allows an attacker to make a profit off a smart contract
cryptocurrency exchange like Bancor?

  • A. Arithmetic
  • B. Access Control
  • C. Race Conditions
  • D. Reentrancy
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

A blockchain-based solution best achieves which of the following goals?

  • A. Data control
  • B. Data deletion
  • C. Data retention
  • D. Data privacy
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following blockchains does NOT use broadcast communications?

  • A. Hyperledger
  • B. Ethereum
  • C. Corda
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
Discussions
vote your answer:
A
B
C
0 / 1000

Question 10

Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built
in from the beginning

  • A. True
  • B. False
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 11

Quantum computers threaten traditional cryptography because they provide polynomial solutions to
mathematically "hard" problems

  • A. True
  • B. False
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 12

Transactions can be added to DAG-based distributed ledgers without being validated but the same is
not true for blockchain.

  • A. True
  • B. False
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 13

Which smart contract auditing strategy determines the inputs that will cause different parts of the
code to run?

  • A. Symbolic Execution
  • B. Taint Analysis
  • C. Dynamic Code Analysis
  • D. Control Flow Analysis
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following is designed to allow someone to prove they know a secret without revealing
it?

  • A. Confidential Transaction
  • B. Ring Signature
  • C. Zero-Knowledge Proof
  • D. Stealth Address
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain
and race to make their chain longer than the real chain?

  • A. Selfish Mining Attack
  • B. Long-Range Attack
  • C. Double-Spend Attack
  • D. 51% Attack
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2