Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.
A. True
B. False
The decentralization of the blockchain makes it immune to traditional Denial of Service attacks.
A. True
B. False
Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built in from the beginning.
A. True
B. False
Transactions can be added to DAG-based distributed ledgers without being validated but the same is not true for blockchain.
A. True
B. False
This sample code is vulnerable to which of the following attacks?
A. Bad Randomness
B. Reentrancy
C. Arithmetic
D. Unchecked Return Values
A controversial update to blockchain functionality could increase the vulnerability of the blockchain to attack.
A. True
B. False
For which of the following attacks is a permissioned or private blockchain the best solution?
A. Routing
B. Denial of Service
C. Replay
D. Sybil
Malicious smart contracts can potentially infect the nodes running the blockchain software.
A. True
B. False
A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.
A. True
B. False
The List hack demonstrated that biockchains using short addresses are exploitable.
A. True
B. False
Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply
A. Bad Randomness
B. Short Addresses
C. Timestamp Dependence
D. Race Conditions
Blockchain technology is designated to be self-contained with no interaction with external components.
A. True
B. False
Confidential Transactions prove that inputs and outputs ot a transaction are equal.
A. True
B. False
Which of the following blockchains best implements need-to-know tor blockchain data?
A. Ethereum
B. Corda
C. Hyperledger
A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.
A. True
B. False