Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Blockchain CBSP - BTA Certified Blockchain Security Professional

Page: 3 / 3
Total 91 questions

Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.

A.

Scale

B.

Efficiency

C.

Access Control

D.

Decentralization

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply

A.

Bitcoin

B.

EOS

C.

Verge

D.

List

This sample code is vulnerable to which of the following attacks? Select all that apply.

A.

Unchecked Return Values

B.

Arithmetic

C.

Short Address

D.

Reentrancy

Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to be considered untrusted due to random chance.

A.

True

B.

False

Determining if a transaction is part of the distributed ledger is less computationally intensive in DAG-based solutions than in blockchain

A.

True

B.

False

Which smart contract auditing strategy determines the inputs that will cause different parts of the code to run?

A.

Symbolic Execution

B.

Taint Analysis

C.

Dynamic Code Analysis

D.

Control Flow Analysis

This sample code is vulnerable to which of the following attacks? Select all that apply.

A.

Reentrancy

B.

Unchecked Return Values

C.

Arithmetic

D.

Race Conditions