Download BTA Certified Blockchain Solution Architect.CBSA.VCEplus.2019-07-07.145q.vcex

Vendor: Blockchain
Exam Code: CBSA
Exam Name: BTA Certified Blockchain Solution Architect
Date: Jul 07, 2019
File Size: 574 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).
  1. 256
  2. 128
  3. 32
  4. 20
Correct answer: D
Explanation:
Explanation: Explanation:SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
Explanation: Explanation:
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
Question 2
What type of attack would be considered a very large flaw in public blockchains such as Bitcoin's Blockchain where the majority of hashpower could possibly be controlled thru an attack?
What is the specific attack Bitcoin could be exposed to?
  1. 51% Attacks
  2. Tether Token Hack
  3. DDoS Attack
  4. BIP attack
  5. Parity Wallet Attack
Correct answer: A
Explanation:
Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/
Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/
Question 3
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)
  1. 1,000,000,000,000,000,000
  2. 1,000,000,000,000,000
  3. 1,000,000,000
  4. 10,000
  5. 1,000,000,000,000
Correct answer: AB
Explanation:
Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html
Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html
Question 4
In the Proof of Stake(POS) algorithm the miners are really known as ___________? 
  1. Notary
  2. Oracle
  3. Forgers
  4. Minters
Correct answer: C
Explanation:
Proof of Stake has the same goal as proof of work—to validate transactions and achieve consensus in the chain—and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum cofounder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Proof of Stake has the same goal as proof of work—to validate transactions and achieve consensus in the chain—and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum cofounder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.
Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Question 5
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________.
What is required?
  1. Consensus
  2. Crypthography
  3. Bandwidth
  4. Availability
Correct answer: A
Explanation:
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. Reference: https://en.wikipedia.org/wiki/Byzantine_fault_tolerance
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. Reference: https://en.wikipedia.org/wiki/Byzantine_fault_tolerance
Question 6
A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.
What is the cipher type?
  1. Stream
  2. Block
  3. Parallel
  4. RSA
Correct answer: A
Explanation:
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question 7
You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin.
What is Etherscan used for?
  1. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum Blockchain
  2. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Bitcoin Blockchain
  3. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on the Ethereum and Tokens Blockchain
  4. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place on any Blockchain
Correct answer: A
Explanation:
A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum BlockchainReference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-
A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum Blockchain
Reference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-
Question 8
What are two challenges with using a Proof of Work algorithm? (Select two.)
  1. Mining pools not allowed
  2. Difficulty rate goes done every year.
  3. Expensive
  4. Power Intensive
Correct answer: CD
Explanation:
Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Question 9
Your customer is an enterprise that is focused on financial sectors. What type of blockchain would this customer likely want specified for their enterprise?
  1. Permissionless
  2. Decentralized
  3. Hybrid
  4. Permissioned
Correct answer: D
Explanation:
Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.
Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Question 10
Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?
  1. Neo Generals' problem
  2. Byzantine Generals' problem
  3. Byzantine Admirals' problem 
  4. Renaissance Generals' problem
Correct answer: B
Explanation:
BFT is so-named because it represents a solution to the "Byzantine generals' problem," a logical dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in 1982Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058
BFT is so-named because it represents a solution to the "Byzantine generals' problem," a logical dilemma that researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in 1982
Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!