Download Blockchain.CBSA.Pass4Sure.2019-10-21.119q.vcex

Download Exam

File Info

Exam BTA Certified Blockchain Solution Architect
Number CBSA
File Name Blockchain.CBSA.Pass4Sure.2019-10-21.119q.vcex
Size 370 KB
Posted Oct 21, 2019
Download Blockchain.CBSA.Pass4Sure.2019-10-21.119q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes). Select best answer. 


  1. NSA is spying on us so what’s it matters.
  2. Depends on input
  3. False
  4. True
Correct answer: D
Explanation:
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes).  Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes).  
Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2



Question 2

In the Ethereum EVM there are two types of memory areas. (Select two.)


  1. Storage
  2. Database
  3. Memory
  4. Persistent
  5. Ephemeral
Correct answer: AC
Explanation:
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine



Question 3

What are some advantages of Proof of Stake(POS) mining over Proof of Work(POW) mining? (Select three.)


  1. Energy efficient in regards to that it could consume for electricity as compared to PoW
  2. Faster Hashing algorithms
  3. No need for expensive compared to POW
  4. Faster validations compared to POW
  5. Better blockchain security compared to POW
Correct answer: ACD
Explanation:
This eliminates the below challenges from PoW and believed to have an advantage. No need of expensive hardware (a normal laptop or computer running the respective coin’s Validator client will do as long as your laptop or computer is online) Energy efficient as it won’t consume high electricity as PoW does More loyal Validators As higher the stake the Validators have for a long time, more chances for the Validator to be picked up for “forging” and earn the transaction fee Faster validations  Reference: https://medium.com/@karthik.seshu/cryptocurrency-proof-of-work-vs-proof-of-stake-e1eee1420b10
This eliminates the below challenges from PoW and believed to have an advantage. 
No need of expensive hardware (a normal laptop or computer running the respective coin’s Validator client will do as long as your laptop or computer is online) 
Energy efficient as it won’t consume high electricity as PoW does More loyal Validators As higher the stake the Validators have for a long time, more chances for the Validator to be picked up for “forging” and earn the transaction fee Faster validations  
Reference: https://medium.com/@karthik.seshu/cryptocurrency-proof-of-work-vs-proof-of-stake-e1eee1420b10



Question 4

Application Specific Integrated Circuit (ASIC) are used always in enterprise blockchains.


  1. TRUE
  2. FALSE
Correct answer: B
Explanation:
ASICS are generally used in blockchains such as BTC that have a Proof of Work consensus due to competition Reference: https://www.trymining.com/pages/asic-vs-gpu
ASICS are generally used in blockchains such as BTC that have a Proof of Work consensus due to competition 
Reference: https://www.trymining.com/pages/asic-vs-gpu



Question 5

What type of encryption is shown below and is commonly used in blockchain cryptography?  
  


  1. Diffie-Hellman
  2. Asymmetric Encryption
  3. Synchronous
  4. Asynchronous
  5. Symmetric Encryption
Correct answer: B
Explanation:
Asymmetric cryptography utilizes two different keys, a public key and a private to encrypt and decrypt a particular data. The use of one key cancels out the use of the other.  Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Asymmetric cryptography utilizes two different keys, a public key and a private to encrypt and decrypt a particular data. The use of one key cancels out the use of the other.  
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/



Question 6

An encryption algorithm transforms plain text into cipher text using a key?


  1. TRUE
  2. FALSE
Correct answer: A



Question 7

The gas price is a value set by the creator of the blockchain transaction? (Select best answer.)


  1. FALSE
  2. Its Negotiable
  3. TRUE
Correct answer: C
Explanation:
The gas price is a value set by the creator of the transaction, who has to pay gas_price * gas up front from the sending account. If some gas is left after the execution, it is refunded in the same way. If the gas is used up at any point (i.e. it is negative), an out-of-gas exception is triggered, which reverts all modifications made to the state in the current call frame.  Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
The gas price is a value set by the creator of the transaction, who has to pay gas_price * gas up front from the sending account. If some gas is left after the execution, it is refunded in the same way. If the gas is used up at any point (i.e. it is negative), an out-of-gas exception is triggered, which reverts all modifications made to the state in the current call frame.  
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine



Question 8

R3 Corda does not organize time into blocks. What does Corda actually perform and use? 
  


  1. Ripple is implemented as the blockchain and XRP for cryptocurrency.
  2. Notary services and timesmapping
  3. R3 Corda is a blockchain and does use blocks
  4. Notary services and timestamping
Correct answer: D
Explanation:
Review Technical Whitepaper https://www.corda.net/ Corda network has one or more notary services which provide transaction ordering and timestamping services, thus abstracting the role miners play in other systems into a pluggable component.
Review Technical Whitepaper https://www.corda.net/ Corda network has one or more notary services which provide transaction ordering and timestamping services, thus abstracting the role miners play in other systems into a pluggable component.



Question 9

Contracts live on the blockchain in an Ethereum-specific binary format called _____________?


  1. EOS
  2. EVM Code
  3. Ether 
  4. Gas
  5. EVM Bytecode
Correct answer: E
Explanation:
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.



Question 10

Bitcoin uses what proof of work consensus system?


  1. Cubehash512
  2. Scrypt-Jane
  3. Whirlpool
  4. Scrypt-n
  5. Hashcash
Correct answer: E
Explanation:
Bitcoin uses the Hashcash proof of work system.  Reference: https://en.bitcoin.it/wiki/Hashcash
Bitcoin uses the Hashcash proof of work system.  
Reference: https://en.bitcoin.it/wiki/Hashcash



Question 11

Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes). Select best answer. 


  1. NSA is spying on us so what’s it matters.
  2. Depends on input
  3. False
  4. True
Correct answer: D
Explanation:
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes).  Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes).  
Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2



Question 12

In the Ethereum EVM there are two types of memory areas. (Select two.)


  1. Storage
  2. Database
  3. Memory
  4. Persistent
  5. Ephemeral
Correct answer: AC
Explanation:
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine



Question 13

What are some advantages of Proof of Stake(POS) mining over Proof of Work(POW) mining? (Select three.)


  1. Energy efficient in regards to that it could consume for electricity as compared to PoW
  2. Faster Hashing algorithms
  3. No need for expensive compared to POW
  4. Faster validations compared to POW
  5. Better blockchain security compared to POW
Correct answer: ACD
Explanation:
This eliminates the below challenges from PoW and believed to have an advantage. No need of expensive hardware (a normal laptop or computer running the respective coin’s Validator client will do as long as your laptop or computer is online) Energy efficient as it won’t consume high electricity as PoW does More loyal Validators As higher the stake the Validators have for a long time, more chances for the Validator to be picked up for “forging” and earn the transaction fee Faster validations  Reference: https://medium.com/@karthik.seshu/cryptocurrency-proof-of-work-vs-proof-of-stake-e1eee1420b10
This eliminates the below challenges from PoW and believed to have an advantage. 
No need of expensive hardware (a normal laptop or computer running the respective coin’s Validator client will do as long as your laptop or computer is online) 
Energy efficient as it won’t consume high electricity as PoW does More loyal Validators As higher the stake the Validators have for a long time, more chances for the Validator to be picked up for “forging” and earn the transaction fee Faster validations  
Reference: https://medium.com/@karthik.seshu/cryptocurrency-proof-of-work-vs-proof-of-stake-e1eee1420b10



Question 14

Application Specific Integrated Circuit (ASIC) are used always in enterprise blockchains.


  1. TRUE
  2. FALSE
Correct answer: B
Explanation:
ASICS are generally used in blockchains such as BTC that have a Proof of Work consensus due to competition Reference: https://www.trymining.com/pages/asic-vs-gpu
ASICS are generally used in blockchains such as BTC that have a Proof of Work consensus due to competition 
Reference: https://www.trymining.com/pages/asic-vs-gpu



Question 15

What type of encryption is shown below and is commonly used in blockchain cryptography?  
  


  1. Diffie-Hellman
  2. Asymmetric Encryption
  3. Synchronous
  4. Asynchronous
  5. Symmetric Encryption
Correct answer: B
Explanation:
Asymmetric cryptography utilizes two different keys, a public key and a private to encrypt and decrypt a particular data. The use of one key cancels out the use of the other.  Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Asymmetric cryptography utilizes two different keys, a public key and a private to encrypt and decrypt a particular data. The use of one key cancels out the use of the other.  
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/



Question 16

An encryption algorithm transforms plain text into cipher text using a key?


  1. TRUE
  2. FALSE
Correct answer: A



Question 17

The gas price is a value set by the creator of the blockchain transaction? (Select best answer.)


  1. FALSE
  2. Its Negotiable
  3. TRUE
Correct answer: C
Explanation:
The gas price is a value set by the creator of the transaction, who has to pay gas_price * gas up front from the sending account. If some gas is left after the execution, it is refunded in the same way. If the gas is used up at any point (i.e. it is negative), an out-of-gas exception is triggered, which reverts all modifications made to the state in the current call frame.  Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
The gas price is a value set by the creator of the transaction, who has to pay gas_price * gas up front from the sending account. If some gas is left after the execution, it is refunded in the same way. If the gas is used up at any point (i.e. it is negative), an out-of-gas exception is triggered, which reverts all modifications made to the state in the current call frame.  
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine



Question 18

R3 Corda does not organize time into blocks. What does Corda actually perform and use? 
  


  1. Ripple is implemented as the blockchain and XRP for cryptocurrency.
  2. Notary services and timesmapping
  3. R3 Corda is a blockchain and does use blocks
  4. Notary services and timestamping
Correct answer: D
Explanation:
Review Technical Whitepaper https://www.corda.net/ Corda network has one or more notary services which provide transaction ordering and timestamping services, thus abstracting the role miners play in other systems into a pluggable component.
Review Technical Whitepaper https://www.corda.net/ Corda network has one or more notary services which provide transaction ordering and timestamping services, thus abstracting the role miners play in other systems into a pluggable component.



Question 19

Contracts live on the blockchain in an Ethereum-specific binary format called _____________?


  1. EOS
  2. EVM Code
  3. Ether 
  4. Gas
  5. EVM Bytecode
Correct answer: E
Explanation:
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.
The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is not only sandboxed, but actually completely isolated, which means that code running inside the EVM has no access to network, filesystem, or other processes. Smart contracts even have limited access to other smart contracts.



Question 20

Bitcoin uses what proof of work consensus system?


  1. Cubehash512
  2. Scrypt-Jane
  3. Whirlpool
  4. Scrypt-n
  5. Hashcash
Correct answer: E
Explanation:
Bitcoin uses the Hashcash proof of work system.  Reference: https://en.bitcoin.it/wiki/Hashcash
Bitcoin uses the Hashcash proof of work system.  
Reference: https://en.bitcoin.it/wiki/Hashcash









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files