Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Blockchain CBSP BTA Certified Blockchain Security Professional Exam Practice Test

Demo: 13 questions
Total 91 questions

BTA Certified Blockchain Security Professional Questions and Answers

Question 1

Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?

Options:

A.

Taint Analysis

B.

Symbolic Execution

C.

Dynamic Code Analysis

D.

Control Flow Analysis

Question 2

In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?

Options:

A.

Selfish Mining Attack

B.

Long-Range Attack

C.

Double-Spend Attack

D.

51% Attack

Question 3

Which of the following blockchains best implements need-to-know tor blockchain data?

Options:

A.

Ethereum

B.

Corda

C.

Hyperledger

Question 4

Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.

Options:

A.

True

B.

False

Question 5

A blockchain-based solution best achieves which of the following goals?

Options:

A.

Data control

B.

Data deletion

C.

Data retention

D.

Data privacy

Question 6

Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data

Options:

A.

True

B.

False

Question 7

This sample code is vulnerable to which of the following attacks? Select all that apply.

Options:

A.

Reentrancy

B.

Unchecked Return Values

C.

Arithmetic

D.

Race Conditions

Question 8

Decentralization is an organizational risk due to decreased control over the organization's data.

Options:

A.

True

B.

False

Question 9

Transactions can be added to DAG-based distributed ledgers without being validated but the same is not true for blockchain.

Options:

A.

True

B.

False

Question 10

Which of the following attacks only requires a single account and performs only normal blockchain operations?

Options:

A.

Replay Attack

B.

Routing Attack

C.

51% Attack

D.

Eclipse Attack

Question 11

Blockchain technology is designated to be self-contained with no interaction with external components.

Options:

A.

True

B.

False

Question 12

Which type of blockchain is most vulnerable to traditional Denial of Service attacks?

Options:

A.

Proof of Stake

B.

Proof of Work

C.

Proof of Activity

D.

Proof of Space

E.

All of the above

Question 13

Which smart contract auditing strategy determines the inputs that will cause different parts of the code to run?

Options:

A.

Symbolic Execution

B.

Taint Analysis

C.

Dynamic Code Analysis

D.

Control Flow Analysis

Demo: 13 questions
Total 91 questions