Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.

A.

True

B.

False

Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply

A.

Randomness

B.

Large State Space

C.

One-Way

D.

Non-Locality

Which of the following is NOT an essential part of Confidential Transactions?

A.

Zero-Knowledge Proof

B.

Ring Signature

C.

Elliptic Curve Cryptography

D.

Pederson Commitment

The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network

A.

True

B.

False

The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.

A.

True

B.

False

Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply

A.

Bitcoin

B.

EOS

C.

Verge

D.

List

Malicious smart contracts can potentially infect the nodes running the blockchain software

A.

True

B.

False