Pass the Blockchain Blockchain Security Professional CBSP Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Spinning up a large number of temporary mining servers is likely part of what type of attack?

Options:

A.

Routing


B.

Denial of Service


C.

Sybil


D.

Eclipse


Questions # 12:

This sample code is vulnerable to which of the following attacks?

Question # 12

Options:

A.

Bad Randomness


B.

Reentrancy


C.

Arithmetic


D.

Unchecked Return Values


Questions # 13:

A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.

Options:

A.

True


B.

False


Questions # 14:

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply

Options:

A.

Bitcoin


B.

EOS


C.

Verge


D.

List


Questions # 15:

Stealth addresses are designed to do which of the following?

Options:

A.

Conceal transaction amount


B.

Conceal transaction recipient


C.

Conceal transaction sender


D.

Conceal shared secret


Questions # 16:

Which of the following is NOT an essential part of Confidential Transactions?

Options:

A.

Zero-Knowledge Proof


B.

Ring Signature


C.

Elliptic Curve Cryptography


D.

Pederson Commitment


Questions # 17:

From a business perspective, which of me following is the major consideration regarding the use of smart contract technology?

Options:

A.

Public Accessibility


B.

Hosting Requirements


C.

Code as Law" Arbitration


D.

Decentralization


Questions # 18:

Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply

Options:

A.

Bad Randomness


B.

Short Addresses


C.

Timestamp Dependence


D.

Race Conditions


Questions # 19:

A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.

Options:

A.

True


B.

False


Questions # 20:

Which smart contract auditing strategy identities which variables in the function can be affected by the person running it?

Options:

A.

Manual Code Analysis


B.

Symbolic Execution


C.

Taint Analysis


D.

Control Flow Analysis


Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions