The List hack demonstrated that biockchains using short addresses are exploitable
The List hack demonstrated that biockchains using short addresses are exploitableA . TrueB . FalseView AnswerAnswer: A
The List hack demonstrated that biockchains using short addresses are exploitableA . TrueB . FalseView AnswerAnswer: A
Which of the following are good ways to get pseudo-random numbers for smart contracts?A . Private variablesB . Private functionsC . Block hashesD . External oracleView AnswerAnswer: D
Blockchain technology is designated to be self-contained with no interaction with external components.A . TrueB . FalseView AnswerAnswer: B
In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.A . TrueB . FalseView AnswerAnswer: A
Which types of network attacks focus on partitioning the blockchain network? Select all that applyA . EclipseB . SybilC . Denial of ServiceD . RoutingView AnswerAnswer: A,B,C
Which of the following is NOT a common regulatory requirement tor businesses?A . Data transparencyB . Data encryptionC . Personal data protectionD . Data controlView AnswerAnswer: A
Decentralization is an organizational risk due to decreased control over the organization's data.A . TrueB . FalseView AnswerAnswer: A
A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.A . TrueB . FalseView AnswerAnswer: A
A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.A . TrueB . FalseView AnswerAnswer: A
Which smart contract vulnerability allows an attacker to make a profit off a smart contract cryptocurrency exchange like Bancor?A . ArithmeticB . Access ControlC . Race ConditionsD . ReentrancyView AnswerAnswer: C