Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CBSA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CBSA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: BTA Certified Blockchain Solution Architect
  • Last Update: Apr 24, 2024
  • Questions and Answers: 229
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CBSA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CBSA Practice Exam Questions with Answers BTA Certified Blockchain Solution Architect Certification

Question # 6

What is the difference in using Go-Ethereum over Ganache?

A.

Can automate builds with Go Ethereum but you can’t with Ganache

B.

Go Ethereum is written in Java whereas Ganache is written in Golang

C.

Go Ethereum is real blockchain whereas Ganache is a blockchain simulation

D.

Ganache is a real blockchain whereas Go Ethereum is a blockchain simulation

Full Access
Question # 7

Complex application components should try to be concentrated in which application layer?

A.

Interface layer / middle

B.

Presentation / top

C.

Smart Contract / bottom

D.

None of the above

Full Access
Question # 8

Adding more nodes to a blockchain network has which effect?

A.

Increased centralization

B.

Increased security

C.

Decreased costs

D.

Increased performance

Full Access
Question # 9

A chaincode package that was signed at creation can be handed over to other owners for inspection and signing in Hyperledger.

Is it true that the workflow supports out-of-band signing of chaincode package?

A.

TRUE

B.

FALSE

Full Access
Question # 10

Bitcoin implemented Byzantine Fault Tolerance through a system named:

A.

Authenticated Encryption

B.

Proof of Work

C.

PBKDF2

D.

None of the above

Full Access
Question # 11

A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

A.

Stream

B.

Block

C.

Parallel

D.

RSA

Full Access
Question # 12

When a consensus algo is considered to be "pluggable modularity», what does that mean?

A.

Add permission as needed

B.

Add user as needed

C.

Select an optimal algorithm for your networks

D.

Select a specific API that manages the blockchain

Full Access
Question # 13

Transactions can only be added to a blockchain.

A.

TRUE

B.

FALSE

Full Access
Question # 14

What is the accepted best practice for preventing contract addresses from changing when a new contract is released?

A.

Move your contract to a new blockchain

B.

Delete the old contract and add the new version in its place

C.

Addresses always change so use a calling contract

D.

Use the “- -addressForce” parameter when releasing a new contract

Full Access
Question # 15

One critical business consideration you must account for when choosing Hyperledger Fabric over Ethereum is:

A.

Who you will have host the nodes and how will you deploy the network

B.

If your blockchain will use Proof of Work or Proof of Stake

C.

Which cryptographic algorithms Hyperledger Fabric employs

D.

How you will implement your own gas/fee system

Full Access
Question # 16

By design, permissioned blockchains such as Hyperledger Fabric are not capable of creating or utilizing cryptocurrency.

A.

FALSE

B.

TRUE

Full Access
Question # 17

Without 100% autonomy, blockchain software and networks would serve little purpose.

A.

FALSE

B.

TRUE

Full Access
Question # 18

You are using Geth and you would like to list the accounts controlled by the node.

What is the command?

A.

geth list accounts

B.

geth account node list

C.

geth account node

D.

geth account list

Full Access
Question # 19

By default, who can see transaction details on a public/open blockchain?

A.

The initiator

B.

Everyone

C.

The recipient of a transaction

D.

The network owner / administrator

Full Access
Question # 20

When a blockchain software is updated with new functionality that breaks or modifies the rules of the previous version of the software, what has just occurred?

A.

A hard fork

B.

Revision Reversal Attack

C.

A software fault

D.

Autonomous update consensus

Full Access
Question # 21

In the Bitcoin blockchain the "block creation time" is set to 10 minutes and this can never change.

A.

FALSE

B.

TRUE

Full Access
Question # 22

Select the two kinds of accounts in Ethereum which share the same address space. (Select two.)

A.

Gas Account

B.

Contract Accounts

C.

External Accounts

D.

Internal Accounts

E.

dApp Accounts

Full Access
Question # 23

You currently on a conference call with an executive from a too big to fail bank. They are validating that they want to use Quorum or another enterprise blockchain. They specifically want to know what type of consensus algo it uses and what industry for the Quorum blockchain targets.

A.

BFT, cross industry

B.

POS, Financial only

C.

Majority voting, Financial only

D.

Majority voting, cross industry

E.

POW, cross industry

Full Access
Question # 24

An _____________ is a well-known service that signs transactions if they state a fact and that fact is considered to be true. They may optionally also provide the facts.

A.

notary

B.

oracle

C.

node

D.

endpoint

Full Access
Question # 25

What are two challenges with using a Proof of Work algorithm? (Select two.)

A.

Mining pools not allowed

B.

Difficulty rate goes done every year.

C.

Expensive

D.

Power Intensive

Full Access
Question # 26

In Ethereum how is the block difficulty determined in Ethereum?

A.

The Block Difficulty increases when the time between mined blocks is below 10 seconds, while it decreases when the time is above 20 seconds.

B.

The Block Difficulty is determined by the Ethereum Committee every fortnight to reflect the average amount of transaction and it cannot be influenced by the network itself.

C.

The Block Difficulty increases when the time between mined blocks is below 20 seconds, while it decreases when the tie is above 60 seconds.

Full Access
Question # 27

Byzantine Fault Tolerance can be achieved only through Proof of Work.

A.

FALSE

B.

TRUE

Full Access
Question # 28

Regarding Ethereum contracts, the contracts can call (perform) two specific message calls. The message calls are either _____________ or __________? (Select two.)

A.

Bitcoin nodes

B.

Send Ether to non-contract

C.

DApps

D.

Other contracts

E.

Ether Nodes

Full Access
Question # 29

In Ethereum a block contains two very important parameters. (Select two.)

A.

Difficulty

B.

Release date

C.

Block number

D.

Timestamp

Full Access
Question # 30

The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key?

A.

TRUE

B.

FALSE

Full Access
Question # 31

In the Proof of Stake(POS) algorithm the miners are really known as ___________?

A.

Notary

B.

Oracle

C.

Forgers

D.

Minters

Full Access
Question # 32

You would like to start your Gethin Fast Sync Mode.

What is the command for this?

A.

geth-mode—fast—cache 4096

B.

geth—fast—cache 4096

C.

geth—cache—fast 4096

D.

geth—fast-mode—cache 4096

Full Access
Question # 33

The___________________ is the runtime environment for smart contracts in Ethereum?

A.

Metamask

B.

Ether

C.

Mist

D.

EVM

Full Access
Question # 34

What are two reasons that you would consider implementing a POW algo in your blockchain? (Select two.)

A.

PoW imposes no limits on actions in the network and therefore can thwart attacks better than other algos due to high cost

B.

What matters is to have large computational power to solve the puzzles and form new blocks over having a financial stake.

C.

PoW imposes some limits on actions in the network and therefore can thwart attacks better than other algos due to high cost

D.

The algo is energy efficient compared to POS and BFT

E.

The algo is energy efficient compared to POS and DPOS

Full Access