CBSA MCQs
CBSA TestPrep CBSA Study Guide CBSA Practice Test
CBSA Exam Questions
killexams.com BlockChain CBSA
BTA Certified Blockchain Solution Architect
https://killexams.com/pass4sure/exam-detail/CBSA
Question: 187
What is a logic gate in electronics and computer science?
Answer: D
A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0. A XOR logic gate takes in 2 binary inputs and gives out a high output ONLY when the inputs are different. Meaning, if A and B are inputted to a XOR gate then the out C will be 1 ONLY when A is not equal toB.
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question: 188
Ethereum is considered to be a type of blockchain.
Answer: A
Permissionless ??? anyone can join Anyone can run a node, run mining software/hardware, access a wallet and write data onto and transact within the blockchain
(as long as they follow the rules of the bitcoin blockchain). There is no way to censor anyone, ever, on the permissionless bitcoin blockchain.
Question: 189
Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda.
What is the best answer?
Answer: A
Corda does not share the same requirements as Bitcoin: we require absolute certainty over transaction finality and we need to know who our counterparts are.
So we had the freedom ??? and took this opportunity ??? to solve the consensus problem in a different way. In particular, Corda solves the privacy issue in a number of manners, primarily by allowing for separation of consensus into a service which we call the Notary Cluster. Corda was designed for business from the start. It has no cryptocurrency built into the platform and does not require mining-style consensus, which imposes great cost with little business benefit.
Question: 190
Your customer is an enterprise that is focused on financial sectors. What type of blockchain would this customer likely want specified for their enterprise?
Answer: D
Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.
Question: 191
Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?
Answer: B
BFT is so-named because it represents a solution to the "Byzantine generals??? problem," a logical dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in 1982
Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058
Question: 192
The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key?
Answer: A
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and- encrypting
Question: 193
A cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.
What is the cipher type?
Answer: A
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question: 194
You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin. What is Etherscan used for?
Answer: A
A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum Blockchain
Reference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-
Question: 195
What are two challenges with using a Proof of Work algorithm? (Select two.)
Answer: CD
Question: 196
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)
Answer: AB
Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html
Question: 197
In the Proof of Stake(POS) algorithm the miners are really known as ?
Answer: C
Proof of Stake has the same goal as proof of work""to validate transactions and achieve consensus in the chain""and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum cofounder
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires . What is required?
Answer: A
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus.
Reference: https://en.wikipedia.org/wiki/
Byzantine_fault_tolerance
Question: 199
SHA-1 is the most commonly used SHA algorithm, and produces a -byte hash value(size).
Answer: D
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and- encrypting
Question: 200
What type of attack would be considered a very large flaw in public blockchains such as Bitcoin???s Blockchain
where the majority of hashpower could possibly be controlled thru an attack? What is the specific attack Bitcoin could be exposed to?
Answer: A
Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/
KILLEXAMS.COM
Killexams.com is a leading online platform specializing in high-quality certification exam preparation. Offering a robust suite of tools, including MCQs, practice tests, and advanced test engines, Killexams.com empowers candidates to excel in their certification exams. Discover the key features that make Killexams.com the go-to choice for exam success.
Killexams.com provides exam questions that are experienced in test centers. These questions are updated regularly to ensure they are up-to-date and relevant to the latest exam syllabus. By studying these questions, candidates can familiarize themselves with the content and format of the real exam.
Killexams.com offers exam MCQs in PDF format. These questions contain a comprehensive
collection of questions and answers that cover the exam topics. By using these MCQs, candidate can enhance their knowledge and improve their chances of success in the certification exam.
Killexams.com provides practice test through their desktop test engine and online test engine. These practice tests simulate the real exam environment and help candidates assess their readiness for the actual exam. The practice test cover a wide range of questions and enable candidates to identify their strengths and weaknesses.
Killexams.com offers a success guarantee with the exam MCQs. Killexams claim that by using this materials, candidates will pass their exams on the first attempt or they will get refund for the purchase price. This guarantee provides assurance and confidence to individuals preparing for certification exam.
Killexams.com regularly updates its question bank of MCQs to ensure that they are current and reflect the latest changes in the exam syllabus. This helps candidates stay up-to-date with the exam content and increases their chances of success.