Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Blockchain CBDH - BTA Certified Blockchain Developer – Hyperledger

Page: 6 / 6
Total 195 questions

Exhibit.

A.

This command issues a card for the admin user

B.

This command issues a revocation for the user Ernesto

C.

This command issues a card for the user Ernesto and exports the card file to the current directory

D.

This command does none of the above

In Hyperledger Fabric each channel will manage its own _______ and ________? Select best answer.

A.

Nodes, Peers, Chaincode

B.

Chaincode, SQL

C.

Ledgers, Logging

D.

Ledgers, Chaincode

E.

Ledgers, Chaincode and APIS

Which Hyperledger tool would you select to invoke, deploy or query blocks, transactions and associated data, network information (name, status, list of nodes), chain codes and transaction families, as well as other relevant information stored in the ledger?

A.

Hyperledger Quilt

B.

Hyperledger Cello

C.

Hyperledger Caliper

D.

Hyperledger Explorer

The Membership Services Provider provides identity, privacy, and confidentiality to the network and also by default issues two types of certificates.

What are the certificate types? (Select two.)

A.

Does not issue certificates by default

B.

pcert

C.

tcert

D.

scert

E.

ecert

The keyword is used if you do not want the resource to be instantiated while still used as a super type for the other resources of that type.

A.

extends

B.

noinstantiate

C.

concrete

D.

abstract

Every chaincode has an ________________ policy which specifies the set of peers on a channel that must execute chaincode and endorse the execution results in order for the transaction to be considered valid.

A.

Endorsement

B.

Transaction

C.

Validation

D.

Chaincode

In Hyperledger Fabric Composer, what testing tools are available?

A.

Mocha

B.

Chai

C.

Both A and B

D.

Neither A nor B

Consensus algorithms are used because _______________

A.

They can include specific rules or conditions to be met

B.

They increase the network security from hacking

C.

They prevent blockchain node failure

D.

They increase network speed