Pass the Blockchain Blockchain Solution Architect CBSA Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Addresses on a blockchain are derived by a process of hashing _________.

Options:

A.

Wallet Addresses


B.

Private Keys


C.

IP Addresses


D.

Mac addresses


E.

Public Keys


Questions # 2:

Consider the following scenario. A startup is building a chat app for smart phones where the messages sent between users are anonymous and get destroyed within 24 hours of being sent.

Which architecture would best solve the product need?

Options:

A.

Ethereum for token management and chat messages; Mobile apps use JSON-RPC to communicate directly with Smart Contracts


B.

Private blockchain to persist chat messages; Custom built token system with private blockchain smart contract


C.

Token management for shareholders in a public blockchain; Mobile apps and data management built on existing multitier systems without use of blockchain


D.

Hybrid blockchain for token management with Proof of Stake; private blockchain to persist the chat messages


Questions # 3:

What type of "bug" generally occurs when something isn’t right according to business requirements?

Options:

A.

Business logic


B.

Business Requirements


C.

Integration


D.

Accessibility


E.

Security


Questions # 4:

Blockchain systems assume all parties are trusted by all other parties in the exchange or ecosystem.

Options:

A.

FALSE


B.

TRUE


Questions # 5:

In common blockchain design, blockchain addresses or “accounts” are generated by:

Options:

A.

A PRNG output guaranteed to be unique


B.

A server/node timestamp added to a PRNG output


C.

Creating a hash based on a cryptographic public key and various meta data


D.

The most recent block height hash combined with a cryptographic private key


Questions # 6:

Geth uses what port to expose the Ethereum RPC Service?

Options:

A.

2096


B.

8545


C.

4096


D.

2545


Questions # 7:

In its simplest form, user identity on a blockchain can be unique and secure:

Options:

A.

By users utilizing public blockchains


B.

User identity cannot yet be protected on blockchain systems


C.

Through cryptographic hashing


D.

By users utilizing permissioned blockchains


Questions # 8:

Which of these technical components best represents why cryptocurrency is able to operate successfully?

Options:

A.

An immutable digital ledger that is validated and distributed across many peers


B.

Using API calls, cryptocurrency having a direct correlation to USD exchange rates


C.

High performance computing power allows cryptocurrency to be minted just as a central government might do with fiat currency


D.

Blockchain cryptocurrency transactions are always public which generates user trust and adoption


Questions # 9:

What consensus algo uses a method of sending coins to an address where they cannot be retrieved?

Options:

A.

Proof of Stake


B.

Proof of Activity


C.

Proof of Burn


D.

Proof of Sending


Questions # 10:

To determine the anticipated load on an application, the number of end users should be considered along with?

Options:

A.

The location of the user


B.

The average number of transactions per user


C.

The average age of the user


D.

The average bandwidth speed of the user


Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions