For which of the following attacks is a permissioned or private blockchain the best solution?
A. Routing
B. Replay
C. Sybil
D. Denial of Service
正解:C
質問 2:
Which of the following blockchains uses a channel-focused architectural design?
A. Hyperledger
B. Ethereum
C. Corda
正解:C
質問 3:
The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its vulnerability to traditional Denial of Service attacks
A. False
B. True
正解:A
質問 4:
Which type of blockchain is most vulnerable to traditional Denial of Service attacks?
A. All of the above
B. Proof of Space
C. Proof of Work
D. Proof of Stake
E. Proof of Activity
正解:D
質問 5:
Stealth addresses are designed to do which of the following?
A. Conceal shared secret
B. Conceal transaction sender
C. Conceal transaction amount
D. Conceal transaction recipient
正解:D
質問 6:
Which of the following is designed to allow someone to prove they know a secret without revealing it?
A. Stealth Address
B. Ring Signature
C. Zero-Knowledge Proof
D. Confidential Transaction
正解:C
質問 7:
Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.
A. False
B. True
正解:B
質問 8:
Malicious smart contracts can potentially infect the nodes running the blockchain software
A. False
B. True
正解:B
神谷** -
思考過程では、Pass4Test実際のCBSP予備試験合格者の思考をできる限り丁寧に記述。
合格者が、問題を見てどのような思考を経たうえで答案を作成しているかが追体験できる。