Implementing data access as a blockchain smart contract is a good solution for generating an audit
log of access to sensitive data
A
Malware infections of blockchain nodes can compromise the security of the blockchain's consensus
algorithm.
A
All smart contracts are audited for correctness and checked for malicious code before being
uploaded to the blockchain.
B
The decentralization of the blockchain makes it immune to traditional Denial of Service attacks
B
Which blockchain security control either risks centralization or permanently divergent chains?
D
Which of the following is NOT an essential part of Confidential Transactions?
A
Which smart contract vulnerability allows an attacker to make a profit off a smart contract
cryptocurrency exchange like Bancor?
C
A blockchain-based solution best achieves which of the following goals?
C
Which of the following blockchains does NOT use broadcast communications?
C
Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built
in from the beginning
A
Quantum computers threaten traditional cryptography because they provide polynomial solutions to
mathematically "hard" problems
A
Transactions can be added to DAG-based distributed ledgers without being validated but the same is
not true for blockchain.
A
Which smart contract auditing strategy determines the inputs that will cause different parts of the
code to run?
A
Which of the following is designed to allow someone to prove they know a secret without revealing
it?
C
In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain
and race to make their chain longer than the real chain?
B