Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CBSA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CBSA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: BTA Certified Blockchain Solution Architect
  • Last Update: May 18, 2024
  • Questions and Answers: 229
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CBSA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CBSA Practice Exam Questions with Answers BTA Certified Blockchain Solution Architect Certification

Question # 6

The gas price is a value set by the creator of the blockchain transaction? (Select best answer.)

A.

FALSE

B.

Its Negotiable

C.

TRUE

Full Access
Question # 7

Bitcoin implemented Byzantine Fault Tolerance through a system named:

A.

Authenticated Encryption

B.

Proof of Work

C.

PBKDF2

D.

None of the above

Full Access
Question # 8

The primary difference between a blockchain and blockless solution is?

A.

Blockless solutions are slower

B.

Blockless solutions are less reliable

C.

Transactions are not verified by the entire network in a blockless environment

D.

Blockless solutions do not work on mobile devices

Full Access
Question # 9

The block creation time is set to how many minutes in Bitcoin? 

A.

1

B.

10

C.

120

D.

100

E.

15

F.

150

Full Access
Question # 10

Gas has multiple associated terms with it: Gas Prices, Gas Cost, Gas Limit, and Gas Fees. The principle behind Gas is to have a stable value for how much a transaction or computation costs on the Ethereum network.

Which is considered to be the static value for how much a computation costs in terms of Gas?

A.

Price

B.

Fee

C.

Cost

D.

Limit

Full Access
Question # 11

You are using Truffle for an Ethereum contract and would like to use a default set of contracts and tests from within an empty project directory.

What is the syntax?

A.

truffle defaults

B.

truffle init

C.

truffle test

D.

truffle compile

Full Access
Question # 12

The Secure Registry Services enables Secured ____________Registry of base Hyperledger images and custom images containing chaincodes.

What type of registry is implemented?

A.

Docker

B.

EVM

C.

Kubenetes

D.

VMWare

Full Access
Question # 13

In public key cryptography, the private key is used to:

A.

Encrypt the public key

B.

Generate unique hash values each time it is used

C.

Verify the digital signature of a public key

D.

Sign/approve any transaction/action that might be made by the holder of the key pair

Full Access
Question # 14

In blockchains there is the concept of "Group Consensus" and how many members must agree.

A.

52%

B.

74%

C.

75%

D.

51%

E.

100%

Full Access
Question # 15

What is the nonce-field in a transaction?

A.

To sum up all ethers sent from that address

B.

Protects against replay attacks

C.

To distribute the workloads in the EVM

D.

Adds a checksum for transactions

Full Access
Question # 16

You are considering a cryptocurrency and for your privacy and anonymity are number one priority.

Which cryptocurrency should you likely use?

A.

Monero

B.

Bitcoin

C.

Dash

D.

Shadowcoin

E.

Litecoin

Full Access
Question # 17

It is impossible to persist media types such as MP3 and MOV on any distributed ledger.

A.

FALSE

B.

TRUE

Full Access
Question # 18

Which technical feature of blockchain best promotes the notion of a blockchain being “censorship resistant”?

A.

An immutable ledger of transactions

B.

Permissions-based transactions

C.

Smart Contracts/transactional code that is executed “on chain”

D.

Consensus systems through Proof of Work and Proof of Stake

Full Access
Question # 19

The Hyperledger Fabric business network is divided into three categories.

What are the three categories? (Select three.)

A.

Membership

B.

Chaincode

C.

Networking

D.

EVM

E.

Blockchain

Full Access
Question # 20

When considering a new ERC20 token its best to consider using ____________________.

A.

Use a template from AWS

B.

Audited Implementation

C.

Start a new one

D.

Copy from existing token

Full Access
Question # 21

The ____________of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as ________nodes. Each node is simply a cryptographic hash of a transaction.

CBSA question answer

In the above diagram, Transaction A,B, C,C from the leaves of the tree. Select one.

A.

Root, Hash

B.

Root, Leaf Nodes

C.

Has, Root nodes

D.

Leaf nodes, Root

E.

Leaf Nodes, Root

Full Access
Question # 22

Blockchains are decentralized ledgers which, by definition, are not controlled by a central authority. Due to the value stored in these ledgers, bad actors have huge economic incentives to try and cause faults.

What algo was the original solution to the potential problem as specified by Satoshi?

A.

Proof of Stake

B.

Byzantine Fault Tolerance

C.

Proof of Burn

D.

Proof of Work

E.

Dynamic Proof of Stake

Full Access
Question # 23

In Hyperledger Fabric chaincode runs in a secured Docker container isolated from the endorsing peer process?

A.

TRUE

B.

FALSE

Full Access
Question # 24

Which of following scenarios and datasets would be best suited to be utilized by a blockchain solution?

A.

Scenario: Online game, Dataset: Unique Items In Game, Battles Won, Quests Completed

B.

Scenario: Mobile app for inspirational quotes; Dataset: First Name, Last Name, Quote of the Day

C.

Scenario: Sales (CRM) website; Dataset: Hot Lead Count, Lead Score, Lead Fullname, Today’s Tasks

D.

All of the above

Full Access
Question # 25

In common blockchain design, which data structure is used to create a lightweight digital fingerprint of all the transactions within a block?

A.

Blockchains are unique in that they utilize no data structures

B.

Lexicographic Search Tree

C.

Bloom Filter

D.

Merkle Tree

Full Access
Question # 26

The fabric framework is implemented on ______programming language.

What programming language?

A.

Go

B.

Python

C.

Node.js

D.

Java

E.

JS

Full Access
Question # 27

Select the best statement for determining how consensus is reached.

A.

By the miner nodes which make sure that a transaction is valid.

B.

By a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.

C.

By every single node in the blockchain network different transactions.

D.

By every single node in the blockchain network executing the same transaction.

Full Access
Question # 28

Byzantine Fault Tolerance can be achieved only through a Proof of Work.

A.

FALSE

B.

TRUE

Full Access
Question # 29

Your customer is an enterprise that is focused on financial sectors.

What type of blockchain would this customer likely want specified for their enterprise?

A.

Permissionless

B.

Decentralized

C.

Hybrid

D.

Permissioned

Full Access
Question # 30

How are "assets" in Hyperledger Fabric represented? (Select two.)

A.

JSON

B.

Node

C.

YAML

D.

Binary

E.

Deployment Manager

Full Access
Question # 31

In what way(s) can Ethereum Smart Contract functions be invoked?

A.

Only through code executed in other Smart Contracts and XML-RPC

B.

Through code executed in other Smart Contracts and through web3.js or any JSON-RPC library

C.

Only through code executed in another Smart Contract

D.

Smart Contracts cannot be externally invoked. They become autonomous at launch and cannot be called.

Full Access
Question # 32

Proof of Stake offers which advantage over Proof of Work?

A.

Greater transaction speed

B.

It is compatible with new generation chipsets

C.

It has a longer history and deeper knowledge base

D.

None of the above

Full Access
Question # 33

The merkle tree contains a full list of the transactions on the blockchain?

A.

FALSE

B.

TRUE

Full Access
Question # 34

Blockchain provenance is defined as _______________?

A.

Information sent to the blockchain and written to the blockchain.

B.

Recording the history of data, from its last block to various stages of the data lifecycle

C.

Recording the history of data, from its inception to various stages of the data lifecycle.

D.

Once a transaction has been written and committed to the ledger it cannot be changed.

Full Access
Question # 35

Which of these reasons is a good reason to choose a conventional database over blockchain to store application data?

A.

Centralization is to be avoided

B.

Databases should never be used over blockchain

C.

Full history is needed for all data

D.

High performance is required

Full Access
Question # 36

Chaincode Services uses Docker to host (deploy) the chaincode without relying on any virtual machine or computer language.

What would be the main reason or best reason that Hyperledger chose containers over virtual machines?

A.

Docker provides a secured, lightweight method to sandbox chaincode execution that is not “locked down”.

B.

Docker provides a secured, lightweight method to sandbox chaincode execution that is not “locked down” but additional programming languages cannot be enabled.

C.

Docker provides a secured, lightweight method to sandbox chaincode execution that is “locked down”.

D.

Docker is fully compatible with Hyperledger and Linux with an upgrade subscription.

Full Access
Question # 37

A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

A.

Stream

B.

Block

C.

Parallel

D.

RSA

Full Access
Question # 38

Bitcoin uses what proof of work consensus system?

A.

Cubehash512

B.

Scrypt-Jane

C.

Whirlpool

D.

Scrypt-n

E.

Hashcash

Full Access
Question # 39

Which one of the following is true concerning Hyperledger Fabric?

A.

Cryptocurrency cannot be created or used

B.

because it is permissioned, companies cannot launch products on it

C.

Because it is permissioned, it is impossible to display data to the general public

D.

None of the above

Full Access
Question # 40

Geth uses what port to expose the Ethereum RPC Service?

A.

2096

B.

8545

C.

4096

D.

2545

Full Access
Question # 41

You are considering writing a smart contract for Ethereum and would like to use a robust programming language.

Which programming language is considered the most flexible and robust for Ethereum?

A.

Solidity

B.

Python

C.

Serpent

D.

JS

Full Access
Question # 42

All blockchain networks and systems require autonomous on-chain code in order to process transactions.

A.

FALSE

B.

TRUE

Full Access
Question # 43

What component on the blockchain maintains the "world state"?

A.

.acl

B.

Reputation Manager

C.

Distributed Ledger

D.

.bna

Full Access
Question # 44

Which of these technical components best represents why cryptocurrency is able to operate successfully?

A.

An immutable digital ledger that is validated and distributed across many peers

B.

Using API calls, cryptocurrency having a direct correlation to USD exchange rates

C.

High performance computing power allows cryptocurrency to be minted just as a central government might do with fiat currency

D.

Blockchain cryptocurrency transactions are always public which generates user trust and adoption

Full Access
Question # 45

Consider the following scenario: Due to consistent inaccuracies and outdated real estate listings, a residential real estate company wants to build a blockchain solution that accurately depicts which homes (assets) are available for purchase across all countries/provinces. All available homes should be publicly viewable by the general consumer audience, but certain details of the home, such as history of maintenance, should only be viewable by licensed real estate professionals.

Which architecture would best solve the product need?

A.

Public data hosted on a public blockchain, Privileged data security hoisted on a private database

B.

The entire solution built on a private blockchain with proper permissions for both public and privileged data

C.

Public and privileged data on hybrid blockchain will Proof of Stake consensus

D.

Public data hosted on a public blockchain; Privileged data hosted on a private blockchain

Full Access
Question # 46

Which types of data are able to be stored on any given blockchain ledger?

A.

Each blockchain software specifies its own data storage rules

B.

Any data that is within the UTC-8 standard

C.

Unencrypted textual and numerical data

D.

Encrypted textual and numerical data

Full Access
Question # 47

Which cryptocurrency is also known as "Smart Money" in the blockchain world?

A.

Ether

B.

BTC

C.

Monero

D.

Litecoin

Full Access
Question # 48

Anonymity can be protected in blockchain applications by use of which of the following?

A.

Centralized application hosting

B.

End-to-end encryption

C.

Cryptographic hashing

D.

Blockchain-based data cubes

Full Access
Question # 49

A private blockchain like Hyperledger would be the right choice for which scenario:

A.

An enterprise that needs to build a scalable, secure, permissioned blockchain application

B.

A network of family members who want to share passwords and other secure information with one another

C.

Developers who want to rapidly prototype public blockchain solutions

D.

A startup that desires to build a token and blockchain application for their users

E.

All of the above

Full Access
Question # 50

In Ethereum the difficulty adjustment algorithm is coded in the ___________ file.

A.

calcDifficultyFrontier

B.

block_validator.go

C.

calcDifficultyHomestead

D.

calcDifficultyvalidator.go

Full Access
Question # 51

Transactions can be only added to a blockchain.

A.

FALSE

B.

TRUE

Full Access
Question # 52

When you are developing with Fabric Composer which of the following is true?

A.

Decreases the time of development

B.

Simplifies the development of applications

C.

Simplifies the integration of client applications

D.

Increases the time of development

Full Access
Question # 53

Ethereum tries to keep the mining time difference between ____ and _____seconds.

A.

10, 18

B.

10, 20

C.

10, 29

D.

10, 19

Full Access
Question # 54

An encryption algorithm transforms plain text into cipher text using a key?

A.

TRUE

B.

FALSE

Full Access
Question # 55

______________is supposed to be the constant cost of network resources/utilization in the Ethereum blockchain?

What is the constant?

A.

Wei

B.

Tether

C.

Gas

D.

Ether

Full Access
Question # 56

Taking a series of unrelated transactions and writing them to a particular block is:

A.

Highly insecure and considered bad practice

B.

Most common in public blockchain

C.

Most common in permissioned blockchains

D.

Required among all blockchains

Full Access
Question # 57

What is the difference in using Go-Ethereum over Ganache?

A.

Can automate builds with Go Ethereum but you can’t with Ganache

B.

Go Ethereum is written in Java whereas Ganache is written in Golang

C.

Go Ethereum is real blockchain whereas Ganache is a blockchain simulation

D.

Ganache is a real blockchain whereas Go Ethereum is a blockchain simulation

Full Access
Question # 58

You would like to start your Gethin Fast Sync Mode.

What is the command for this?

A.

geth-mode—fast—cache 4096

B.

geth—fast—cache 4096

C.

geth—cache—fast 4096

D.

geth—fast-mode—cache 4096

Full Access
Question # 59

Ownership or partial ownership of an asset can be tracked with which type of token?

A.

Equity

B.

Utility

C.

Ethereum

D.

Game-based

Full Access
Question # 60

When a blockchain software is updated with new functionality that breaks or modifies the rules of the previous version of the software, what has just occurred?

A.

A hard fork

B.

Revision Reversal Attack

C.

A software fault

D.

Autonomous update consensus

Full Access
Question # 61

Is it possible to access the blockchain via an Ethereum Node?

A.

Yes

B.

No

Full Access
Question # 62

Which of these demonstrates the correct order of the lifecycle of a transaction on Ethereum blockchain?

A.

1. User uses Dapp/web3 to start transaction2. User signs the transaction with their private key3. Transaction validated on locally running node4. Transaction broadcast to entire network5. Miners choose to accept or pass on the transaction6. Miner takes each accepted transaction and writes it to the current block

B.

1. User uses Dapp/web3 to start transaction2. Transaction broadcast to entire network3. If accepted by the network, user signs transaction with private key4. Miners choose to accept or pass on the transaction5. Miner takes each accepted transaction and writes it to the current block

C.

Both of these ordering sequences can occur

D.

None of the above

Full Access
Question # 63

What type of "bug" generally occurs when something isn’t right according to business requirements?

A.

Business logic

B.

Business Requirements

C.

Integration

D.

Accessibility

E.

Security

Full Access
Question # 64

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________.

What is required?

A.

Consensus

B.

Crypthography

C.

Bandwidth

D.

Availability

Full Access
Question # 65

Which of the following blockchain key components state how the transactions will be confirmed?

A.

Distributed Ledger database

B.

Validity Rules

C.

Consensus Algorithm

D.

Encryption

Full Access
Question # 66

Transactions can only be added to a blockchain.

A.

TRUE

B.

FALSE

Full Access
Question # 67

Proof of Stake based blockchain systems use what design to permit valid write transactions?

A.

A genesis “Stake” node approves or disapproves transactions announced from other nodes

B.

Validator nodes each give or pay a stake in order to write transactions, and if malicious, will lose their stake

C.

Stakeholders or early product investors host nodes that approve or disapprove transactions from other nodes

D.

Every node on the network holds an equal stake, and if malicious, gets flagged for removal

Full Access
Question # 68

What are two challenges with using a Proof of Work algorithm? (Select two.)

A.

Mining pools not allowed

B.

Difficulty rate goes done every year.

C.

Expensive

D.

Power Intensive

Full Access