Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Blockchain > Blockchain Solution Architect > CBSA

CBSA BTA Certified Blockchain Solution Architect Question and Answers

Question # 4

Adding more nodes to a blockchain network has which effect?

A.

Increased centralization

B.

Increased security

C.

Decreased costs

D.

Increased performance

Full Access
Question # 5

All blockchain networks and systems require autonomous on-chain code in order to process transactions.

A.

FALSE

B.

TRUE

Full Access
Question # 6

___________is advantageous because it presents scalability and low cost transactions, but like DPoS introduces a component of centralization.

What algorithm is being referenced here?

A.

Byzantine Fault Tolerance

B.

Hashgraph

C.

Proof of Stake

D.

Proof of Work

E.

DAG

Full Access
Question # 7

What is a development language which lets developers solve any class of problem in existence given infinite time and resources?

A.

Turing Complete

B.

Turing Incomplete

C.

Solidity

D.

Mist

E.

JVM

F.

EVM

Full Access
Question # 8

Blockchains only work to store financial transactions or other exchanges of monetary value.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Transactions can be only added to a blockchain.

A.

FALSE

B.

TRUE

Full Access
Question # 10

Which factor influences the gas cost to deploy a Smart Contact on the Ethereum blockchain?

A.

None. Smart Contract deployment has a fixed gas cost

B.

The types of operations written in code within the Smart Contract

C.

The current Ethereum market conditions

D.

The total size of the complied Smart Contract measured in kilobytes

Full Access
Question # 11

An on-chain Smart Contract might be considered autonomous in nature because:

A.

It is difficult to alter or update

B.

Once it is deployed, it can never be revoked

C.

Once it is deployed, it is self-managing

D.

All of the above

Full Access
Question # 12

In common blockchain design, which data structure is used to create a lightweight digital fingerprint of all the transactions within a block?

A.

Blockchains are unique in that they utilize no data structures

B.

Lexicographic Search Tree

C.

Bloom Filter

D.

Merkle Tree

Full Access
Question # 13

Vitalik Buterin referred to this concept of trust beyond just currency as ‘smart contracts’ or even blockchain-based “decentralized autonomous organizations” (DAOs).

Ethereum is considered Blockchain version?

A.

2.0

B.

4.0

C.

3.0

D.

1.0

Full Access
Question # 14

When a blockchain software is updated with new functionality that breaks or modifies the rules of the previous version of the software, what has just occurred?

A.

A hard fork

B.

Revision Reversal Attack

C.

A software fault

D.

Autonomous update consensus

Full Access
Question # 15

Hyperledger can best be described as a ____________________?

A.

Blockchain that exclusively supports PoS Consensus

B.

Permissionless blockchain

C.

Token

D.

Blockchain that exclusively supports PoW Consensus

E.

Umbrella collaboration of open source blockchains

Full Access
Question # 16

What are two cryptocurrencies that you would expect to see mining equipment with ASICS? (Select two.)

A.

Bitcoin

B.

Ethereum

C.

Neo

D.

Litecoin

E.

Monero

Full Access
Question # 17

In regards to understanding the Ethereum Virtual Machine what statement is true?

A.

The EVM is extremely powerful, non-turing complete and perfect for doing computational intensive thins, because of the direct access to the graphics card.

B.

The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.

C.

While the EVM is Sandboxed, it isn’t as powerful as the Bitcoin network, because it’s not Turing Complete

D.

The EVM can’t access hardware layers or anything outside a blockchain node because it’s sandboxed.

Full Access
Question # 18

What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

A.

51% Attacks

B.

Tether Token Hack

C.

DDoS Attack

D.

BIP attack

E.

Parity Wallet Attack

Full Access
Question # 19

Which of the following scenarios and databases is least suited to be utilized by a blockchain solution?

A.

Scenario: Law enforcement system; Dataset: Criminal Arrests, Warrants for Arrest, Conviction Date

B.

Scenario: An Email campaign service; Dataset: Recipient Email, From Email; Subject, Body

C.

Scenario: A family filter wifi router; Dataset: Websites Visited, Websites Blocked, Download History

D.

Scenario: Credit score app; Dataset: Credit Score, Hard Inquiries; Collections, Date Removed, Date Added

Full Access
Question # 20

When you are developing with Fabric Composer which of the following is true?

A.

Decreases the time of development

B.

Simplifies the development of applications

C.

Simplifies the integration of client applications

D.

Increases the time of development

Full Access
Question # 21

Addresses on a blockchain are derived by a process of hashing _________.

A.

Wallet Addresses

B.

Private Keys

C.

IP Addresses

D.

Mac addresses

E.

Public Keys

Full Access
Question # 22

In the EVM every account has a persistent key-value store mapping 256-bit words to 256-bit words called ________

A.

Gas

B.

Space

C.

Storage

D.

Datastore

E.

Database

Full Access
Question # 23

What type of "bug" generally occurs when something isn’t right according to business requirements?

A.

Business logic

B.

Business Requirements

C.

Integration

D.

Accessibility

E.

Security

Full Access
Question # 24

Which of the following would NOT be true about what a smart contract gives your organization?

A.

Accuracy

B.

Savings

C.

Autonomy

D.

Trust

E.

Legal Assurance

Full Access
Question # 25

What type of encryption is shown below and is commonly used in blockchain cryptography? 

A.

Diffie-Hellman

B.

Asymmetric Encryption

C.

Synchronous

D.

Asynchronous

E.

Symmetric Encryption

Full Access
Question # 26

You have flown to NYC to have a discussion with a technical executive of a too big to fail bank. You are having a discussion about blockchain algos and the customer is asking what are some disadvantages of using a POW algo?

A.

Centralization of blockchain control

B.

Only use case for computational power is blockchain

C.

Large expenditures for computational power

D.

Not profitable for miners

E.

51% attack mitigation

Full Access
Question # 27

Pending transactions on the Ethereum blockchain are always ordered by highest fee paid to lowest, and then written to the block in that order.

A.

FALSE

B.

TRUE

Full Access
Question # 28

You are considering writing smart contracts and there are a few different languages you can consider. (Select two.)

A.

Truffle

B.

Serpent

C.

Solidity

D.

Embark

Full Access
Question # 29

The Secure Registry Services enables Secured ____________Registry of base Hyperledger images and custom images containing chaincodes.

What type of registry is implemented?

A.

Docker

B.

EVM

C.

Kubenetes

D.

VMWare

Full Access
Question # 30

Which of these is the name of a well known open source peer-to-peer hypermedia distributes file system?

A.

FileBlocks

B.

Hyperbole

C.

FileDropperTM

D.

IPFS

Full Access
Question # 31

The block creation time is set to how many minutes in Bitcoin? 

A.

1

B.

10

C.

120

D.

100

E.

15

F.

150

Full Access
Question # 32

Blockchain systems can offer what advantage over centralized systems?

A.

They are much easier to maintain and update

B.

They have significantly higher transaction speeds

C.

Their distributed ledger systems are more secure and immutable

D.

All of the above

Full Access
Question # 33

Ethereum is a programmable blockchain. What is one of the following reasons is NOT correct regarding Ethereum programmability?

A.

Allows users to create their own operations on any complexity

B.

It serves as a platform for many different types of decentralized blockchain applications

C.

Does not allow users to create their own operations of any complexity

D.

Ethereum also includes a peer-to-peer network protocol

Full Access
Question # 34

You are considering writing a smart contract for Ethereum and would like to use a robust programming language.

Which programming language is considered the most flexible and robust for Ethereum?

A.

Solidity

B.

Python

C.

Serpent

D.

JS

Full Access