Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?

A.

Taint Analysis

B.

Symbolic Execution

C.

Dynamic Code Analysis

D.

Control Flow Analysis

Sidechains can benefit the mainchain in what ways? Select all that apply

A.

Speed

B.

Functionality

C.

Scalability

D.

Security

The List hack demonstrated that biockchains using short addresses are exploitable

A.

True

B.

False

The decentralization of the blockchain makes it immune to traditional Denial of Service attacks

A.

True

B.

False

Which of the following attacks is designed to bypass the protections provided by digital signatures?

A.

Routing

B.

Replay

C.

Sybil

D.

Eclipse

This sample code is vulnerable to which of the following attacks? Select all that apply.

A.

Reentrancy

B.

Unchecked Return Values

C.

Arithmetic

D.

Race Conditions

All smart contracts are audited for correctness and checked for malicious code before being uploaded to the blockchain.

A.

True

B.

False

This sample code is vulnerable to which of the following attacks? Select all that apply

A.

Arithmetic

B.

Race Conditions

C.

Unchecked Return Values

D.

Short Addresses

Which of the following blockchains separates transaction validation and ordering of transactions in blocks into separate steps?

A.

Hyperledger

B.

Ethereum

C.

Corda

D.

All of the above

Which types of network attacks focus on partitioning the blockchain network? Select all that apply

A.

Eclipse

B.

Sybil

C.

Denial of Service

D.

Routing