Which types of network attacks focus on partitioning the blockchain network? Select all that apply
A, B, C
Which of the following is NOT a common regulatory requirement tor businesses?
A
Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to
be considered untrusted due to random chance.
A
Which of the following blockchains uses a channel-focused architectural design?
B
The goal of most network-based blockchain attacks is to enable what type of attack?
A
Properly encrypted data stored in the distributed ledger adequately protects data in both the short-
term and the long-term
A
Multisignatures are designed to allow a set of users to make a valid transaction only if a set minimum
number of them consent
A
A network design where some nodes are prohibited from communicating directly with other nodes
does not compromise the security of the blockchain.
A
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in
consensus?
A
Which smart contract auditing strategy identities which variables in the function can be affected by
the person running it?
B