Blockchain cbsp practice test

BTA Certified Blockchain Security Professional Exam


Question 1

Which types of network attacks focus on partitioning the blockchain network? Select all that apply

  • A. Eclipse
  • B. Sybil
  • C. Denial of Service
  • D. Routing
Answer:

A, B, C

Discussions

Question 2

Which of the following is NOT a common regulatory requirement tor businesses?

  • A. Data transparency
  • B. Data encryption
  • C. Personal data protection
  • D. Data control
Answer:

A

Discussions

Question 3

Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to
be considered untrusted due to random chance.

  • A. True
  • B. False
Answer:

A

Discussions

Question 4

Which of the following blockchains uses a channel-focused architectural design?

  • A. Ethereum
  • B. Corda
  • C. Hyperledger
Answer:

B

Discussions

Question 5

The goal of most network-based blockchain attacks is to enable what type of attack?

  • A. Selfish Mining Attack
  • B. Double-Spend Attack
  • C. 51% Attack
  • D. Long-Range Attack
Answer:

A

Discussions

Question 6

Properly encrypted data stored in the distributed ledger adequately protects data in both the short-
term and the long-term

  • A. True
  • B. False
Answer:

A

Discussions

Question 7

Multisignatures are designed to allow a set of users to make a valid transaction only if a set minimum
number of them consent

  • A. True
  • B. False
Answer:

A

Discussions

Question 8

A network design where some nodes are prohibited from communicating directly with other nodes
does not compromise the security of the blockchain.

  • A. True
  • B. False
Answer:

A

Discussions

Question 9

In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in
consensus?

  • A. Proof of Burn
  • B. Proof of Work
  • C. Proof of Stake
  • D. Proof of Activity
  • E. None of the above
Answer:

A

Discussions

Question 10

Which smart contract auditing strategy identities which variables in the function can be affected by
the person running it?

  • A. Manual Code Analysis
  • B. Symbolic Execution
  • C. Taint Analysis
  • D. Control Flow Analysis
Answer:

B

Discussions
To page 2