Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Blockchain > Blockchain Security Professional > CBSP

CBSP BTA Certified Blockchain Security Professional Question and Answers

Question # 4

The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.

A.

True

B.

False

Full Access
Question # 5

In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?

A.

Proof of Burn

B.

Proof of Work

C.

Proof of Stake

D.

Proof of Activity

E.

None of the above

Full Access
Question # 6

This sample code is vulnerable to which of the following attacks? Select all that apply.

A.

Reentrancy

B.

Unchecked Return Values

C.

Arithmetic

D.

Race Conditions

Full Access
Question # 7

Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply

A.

Randomness

B.

Large State Space

C.

One-Way

D.

Non-Locality

Full Access
Question # 8

Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.

A.

True

B.

False

Full Access
Question # 9

Which smart contract auditing strategy determines the inputs that will cause different parts of the code to run?

A.

Symbolic Execution

B.

Taint Analysis

C.

Dynamic Code Analysis

D.

Control Flow Analysis

Full Access
Question # 10

In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.

A.

True

B.

False

Full Access
Question # 11

Which of the following attacks takes advantage of the fact that transaction information is posted on the blockchain to infer sensitive information?

A.

Smart Contract Exploitation

B.

Data Mining

C.

Brute Force Key Guessing

D.

Cryptanalysis

Full Access
Question # 12

Malicious smart contracts can potentially infect the nodes running the blockchain software

A.

True

B.

False

Full Access
Question # 13

Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?

A.

Taint Analysis

B.

Symbolic Execution

C.

Dynamic Code Analysis

D.

Control Flow Analysis

Full Access