BTA Certified Blockchain Solution Architect CBSA Dumps Questions

Do you know the BTA Certified Blockchain Solution Architect certification exam? Certified Blockchain Solution Architect (CBSA) exam is an elite way to demonstrate your knowledge and skills in this emerging space. After get BTA CBSA certification successfully, you will become a member of a community of Blockchain leaders. But what is the proper way to learn CBSA exam well? I recommend you get this online CBSA dumps questions to prepare for real BTA Certified Blockchain Solution Architect CBSA exam now.

To Clear your worries, Check CBSA Free Dumps Questions

1. SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).

2. What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

3. How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)

4. In the Proof of Stake (POS) algorithm the miners are really known as ___________?

5. A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________.

What is required?

6. A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

7. You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin.

What is Etherscan used for?

8. What are two challenges with using a Proof of Work algorithm? (Select two.)

9. Your customer is an enterprise that is focused on financial sectors.

What type of blockchain would this customer likely want specified for their enterprise?

10. Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

11. The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key?

12. What is a logic gate in electronics and computer science?

13. Ethereum is considered to be a ______________type of blockchain.

14. Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda.

What is the best answer?

15. Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes). Select best answer.

16. In the Ethereum EVM there are two types of memory areas. (Select two.)

17. What are some advantages of Proof of Stake (POS) mining over Proof of Work (POW) mining? (Select three.)

18. Application Specific Integrated Circuit (ASIC) are used always in enterprise blockchains.

19. What type of encryption is shown below and is commonly used in blockchain cryptography?

20. An encryption algorithm transforms plain text into cipher text using a key?

21. The gas price is a value set by the creator of the blockchain transaction? Select best answer.

22. R3 Corda does not organize time into blocks.

What does Corda actually perform and use?

23. Contracts live on the blockchain in an Ethereum-specific binary format called _____________?

24. Bitcoin uses what proof of work consensus system?

25. An _____________ is a well-known service that signs transactions if they state a fact and that fact is considered to be true. They may optionally also provide the facts.

26. Select the two kinds of accounts in Ethereum which share the same address space. (Select two.)

27. The most popular Ethereum development framework is currently Truffle.

What are three features of Truffle? (Select three.)

28. You are considering writing smart contracts and there are a few different languages you can consider. (Select two.)

29. Satoshi Nakamoto invented a way to achieve Decentralized Consensus?

30. Which of the following would NOT be true about what a smart contract gives your organization?

31. The ____________of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as ________nodes. Each node is simply a cryptographic hash of a transaction.

In the above diagram, Transaction A, B, C, C from the leaves of the tree. Select one.

32. Which of the following blockchain is NOT a permissioned blockchain?

33. What blockchain is considered Blockchain 1.0, the first blockchain?

34. In the EVM every account has a persistent key-value store mapping 256-bit words to 256-bit words called

35. ______ is the official Ethereum IDE that allows developers to build and deploy contracts and decentralized applications on top of the Ethereum blockchain.

36. What is the language that Solidity is using to build on the Ethereum Virtual Machines (EVM)?

37. Regarding Ethereum contracts, the contracts can call (perform) two specific message calls. The message calls are either _____________ or __________? (Select two.)

38. Which of the following hashing algos is considered to be the strongest?

39. When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)

40. The___________________ is the runtime environment for smart contracts in Ethereum?

41. Blockchains are decentralized ledgers which, by definition, are not controlled by a central authority. Due to the value stored in these ledgers, bad actors have huge economic incentives to try and cause faults.

What algo was the original solution to the potential problem as specified by Satoshi?

42. What are some likely repercussions that could occur as a result of a 51% attack to the Bitcoin network? (Select three.)

43. __________ is a real-time gross settlement system (RTGS), currency exchange and remittance network by __________

44. A centralized system is one that that is governed by a hierarchical authority.

Which of the following Blockchains would be correctly stated as centralized?

45. Message Calls in the Ethereum EVM is limited to a depth of ______?

46. In the Bitcoin blockchain the "block creation time" is set to 10 minutes and this can never change.

47. What is another name for blockchains that run adjacent to the blockchains and also offer more scope for processing contracts?

48. What are two cryptocurrencies that you would expect to see mining equipment with ASICS? (Select two.)

49. Vitalik Buterin referred to this concept of trust beyond just currency as ‘smart contracts’ or even blockchain-based “decentralized autonomous organizations” (DAOs).

Ethereum is considered Blockchain version?

50. Ethereum is a programmable blockchain.

What is one of the following reasons is NOT correct regarding Ethereum programmability?

51. The block creation time is set to how many minutes in Bitcoin?

52. In Hyperledger Fabric chaincode runs in a secured Docker container isolated from the endorsing peer process?

53. You would like to run Ethereum DApps in a browser without a node. (No need to download blockchain.)

What could you use locally in your Chrome browser?

54. You would like to start your Gethin Fast Sync Mode.

What is the command for this?

55. Which of the following is not considered an Ethereum testnet?

56. Looking the graph below, what type of an attack is this likely?

57. What does the 20 in ERC20 mean or relate to?

58. You are considering writing a smart contract for Ethereum and would like to use a robust programming language.

Which programming language is considered the most flexible and robust for Ethereum?


 

Certified Blockchain Business Foundations CBBF Exam Dumps
BTA Certified Blockchain Developer – Hyperledger CBDH Dumps