Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the easiest way to steal cryptocurrency from a user?

A.

Private key theft

B.

Double-spend attack

C.

Consensus hijacking

D.

Eclipse attack

E.

None of the above

Which of the following is designed to allow someone to prove they know a secret without revealing it?

A.

Confidential Transaction

B.

Ring Signature

C.

Zero-Knowledge Proof

D.

Stealth Address

Spinning up a large number of temporary mining servers is likely part of what type of attack?

A.

Routing

B.

Denial of Service

C.

Sybil

D.

Eclipse

Which of the following attacks takes advantage of the fact that transaction information is posted on the blockchain to infer sensitive information?

A.

Smart Contract Exploitation

B.

Data Mining

C.

Brute Force Key Guessing

D.

Cryptanalysis

This sample code is vulnerable to which of the following attacks? Select all that apply.

A.

Unchecked Return Values

B.

Arithmetic

C.

Short Address

D.

Reentrancy

Determining if a transaction is part of the distributed ledger is less computationally intensive in DAG-based solutions than in blockchain

A.

True

B.

False

Data subject to deletion procedures should be stored encrypted on-chain.

A.

True

B.

False

Scanning against a list of common vulnerabilities is an important component of smart contract auditing.

A.

True

B.

False

Which of the following blockchains does NOT use broadcast communications?

A.

Hyperledger

B.

Ethereum

C.

Corda

Which smart contract vulnerability allows an attacker to make a profit off a smart contract cryptocurrency exchange like Bancor?

A.

Arithmetic

B.

Access Control

C.

Race Conditions

D.

Reentrancy