Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Blockchain CBSP BTA Certified Blockchain Security Professional Exam Practice Test

Page: 1 / 9
Total 91 questions

BTA Certified Blockchain Security Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

This sample code is vulnerable to which of the following attacks? Select all that apply.

Options:

A.

Unchecked Return Values

B.

Arithmetic

C.

Short Address

D.

Reentrancy

Question 2

Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply

Options:

A.

Bad Randomness

B.

Short Addresses

C.

Timestamp Dependence

D.

Race Conditions

Question 3

Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?

Options:

A.

Taint Analysis

B.

Symbolic Execution

C.

Dynamic Code Analysis

D.

Control Flow Analysis

Question 4

Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data

Options:

A.

True

B.

False

Question 5

Data subject to deletion procedures should be stored encrypted on-chain.

Options:

A.

True

B.

False

Question 6

Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.

Options:

A.

True

B.

False

Question 7

Which of the following does NOT rely on the security of public key cryptography?

Options:

A.

Stealth Address

B.

Confidential Transaction

C.

Ring Signature

D.

Zero-Knowledge Proof

Question 8

Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built in from the beginning

Options:

A.

True

B.

False

Question 9

Which of the following blockchains separates transaction validation and ordering of transactions in blocks into separate steps?

Options:

A.

Hyperledger

B.

Ethereum

C.

Corda

D.

All of the above

Question 10

Which of the following is a takenaway from the pigeocoin/Bitcom Core hack?

Options:

A.

Importance of scaning code for common vulnerabilities

B.

Importance of cryptanalysis of algorithms used

C.

Import of system-level analysis

D.

Import of a robust change management process

Question 11

In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?

Options:

A.

Selfish Mining Attack

B.

Long-Range Attack

C.

Double-Spend Attack

D.

51% Attack

Question 12

Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.

Options:

A.

True

B.

False

Question 13

Confidential Transactions prove that inputs and outputs ot a transaction are equal.

Options:

A.

True

B.

False

Page: 1 / 9
Total 91 questions