Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
CBSA : BTA Certified Blockchain Solution Architect Exam

BlockChain CBSA Questions & Answers
Full Version: 200 Q&A
CBSA Dumps
CBSA Braindumps
CBSA Real Questions
CBSA Practice Test
CBSA Actual Questions
BlockChain
CBSA
BTA Certified Blockchain Solution Architect
https://killexams.com/pass4sure/exam-detail/CBSA
Question: 187
What is a logic gate in electronics and computer science?
A. A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values,
meaning they can be both 1 and 0.
B. A logic gate usually takes in 3 inputs and gives out 2 output. The inputs and outputs are binary values,
meaning they can be 1 or 0.
C. A logic gate usually takes in 2 inputs and gives out 6 output. The inputs and outputs are binary values,
meaning they can be both 1 and 0.
D. A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values,
meaning they can be 1 or 0.
Answer: D
A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning
they can be 1 or 0. A XOR logic gate takes in 2 binary inputs and gives out a high output ONLY when the inputs
are different. Meaning, if A and B are inputted to a XOR gate then the out C will be 1 ONLY when A is not equal
toB. Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question: 188
Ethereum is considered to be a ______________type of blockchain.
A. Permissionless
B. Permission Based
C. Hybrid
D. Private
Answer: A
Permissionless – anyone can join Anyone can run a node, run mining software/hardware, access a wallet and write
data onto and transact within the blockchain
(as long as they follow the rules of the bitcoin blockchain). There is no way to censor anyone, ever, on the
permissionless bitcoin blockchain.
Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Question: 189
Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda.
The CIO was reading about different blockchain consensus algos and would like to understand what type of
consensus algos is used with Corda.
What is the best answer?
A. R3 Corda is a pluggable blockchain and allows the enterprise flexibility
B. R3 Corda is a byzantine fault tolerant blokchain
C. R3 Corda is a proof of stake based blockchain
D. R3 Corda is a proof of work based blockchain
Answer: A
Corda does not share the same requirements as Bitcoin: we require absolute certainty over transaction finality and
we need to know who our counterparts are.
So we had the freedom – and took this opportunity – to solve the consensus problem in a different way. In
particular, Corda solves the privacy issue in a number of manners, primarily by allowing for separation of
consensus into a service which we call the Notary Cluster. Corda was designed for business from the start. It has
no cryptocurrency built into the platform and does not require mining-style consensus, which imposes great cost
with little business benefit.
Question: 190
Your customer is an enterprise that is focused on financial sectors. What type of blockchain would this customer
likely want specified for their enterprise?
A. Permissionless
B. Decentralized
C. Hybrid
D. Permissioned
Answer: D
Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or
parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that
exist.
Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Question: 191
Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?
A. Neo Generals’ problem
B. Byzantine Generals’ problem
C. Byzantine Admirals’ problem
D. Renaissance Generals’ problem
Answer: B
BFT is so-named because it represents a solution to the "Byzantine generals’ problem," a logical dilemma that
researchers Leslie Lamport, Robert Shostak and Marshall Pease described in an academic paper published in
1982
Reference: https://www.nasdaq.com/article/byzantine-fault-tolerance-the-key-for-blockchains-cm810058
Question: 192
The key difference between encryption and hashing is that encrypted strings can be reversed back into their
original decrypted form if you have the right key?
A. TRUE
B. FALSE
Answer: A
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-
encrypting
Question: 193
A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom
string of characters. It is basically the encryption of each letter one at a time.
What is the cipher type?
A. Stream
B. Block
C. Parallel
D. RSA
Answer: A
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of
characters. It is basically the encryption of each letter one at a time.
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question: 194
You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin.
What is Etherscan used for?
A. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place
on the Ethereum Blockchain
B. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place
on the Bitcoin Blockchain
C. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place
on the Ethereum and Tokens Blockchain
D. A search engine that allows users to easily lookup, confirm and validate transaction that have taken place
on any Blockchain
Answer: A
A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the
Ethereum Blockchain
Reference: https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-
Question: 195
What are two challenges with using a Proof of Work algorithm? (Select two.)
A. Mining pools not allowed
B. Difficulty rate goes done every year.
C. Expensive
D. Power Intensive
Answer: CD
Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Question: 196
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)
A. 1,000,000,000,000,000,000
B. 1,000,000,000,000,000
C. 1,000,000,000
D. 10,000
E. 1,000,000,000,000
Answer: AB
Reference: http://www.btcsatoshi.com/ http://ethdocs.org/en/latest/ether.html
Question: 197
In the Proof of Stake(POS) algorithm the miners are really known as ___________?
A. Notary
B. Oracle
C. Forgers
D. Minters
Answer: C
Proof of Stake has the same goal as proof of work""to validate transactions and achieve consensus in the
chain""and it uses an algorithm but with a different process. With proof of stake, the creator of a new block "is
chosen in a deterministic way, depending on its wealth, also defined as a stake." Since in a proof of stake system,
there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift,
including Ethereum cofounder
Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.
Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Question: 198
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________.
What is required?
A. Consensus
B. Crypthography
C. Bandwidth
D. Availability
Answer: A
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus.
Reference: https://en.wikipedia.org/wiki/
Byzantine_fault_tolerance
Question: 199
SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).
A. 256
B. 128
C. 32
D. 20
Answer: D
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-
encrypting
Question: 200
What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain
where the majority of hashpower could possibly be controlled thru an attack?
What is the specific attack Bitcoin could be exposed to?
A. 51% Attacks
B. Tether Token Hack
C. DDoS Attack
D. BIP attack
E. Parity Wallet Attack
Answer: A
Reference: https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/
User: Seryozha*****![]() ![]() ![]() ![]() ![]() The subjects were clarified in a well-organized manner, and I completed the cbsa exam in 75 minutes with an 81% score, thanks to the killexams.com practice tests. The material was well-organized, and I finished studying it within two weeks. I would highly recommend this question bank to anyone who wishes to pass their certification exams. |
User: Bautista*****![]() ![]() ![]() ![]() ![]() Thanks to killexams.com, I passed my cbsa exam last week, and one exam earlier this month. Their brain practice tests are a great way to learn, either for the exam or just for knowledge. I had lots of questions on the exam, but I knew all the answers, thanks to their study material. |
User: Mila*****![]() ![]() ![]() ![]() ![]() Studying for the bta certified blockchain solution architect exam was a challenging experience, with so many complex subjects to cover. However, using killexams.com study material boosted my self-confidence to pass the exam with an exceptional score of 93%. Although some of the questions were tricky, the accurate answers provided by killexams.com helped me mark the right answers. |
User: Tim*****![]() ![]() ![]() ![]() ![]() I am happy to inform you that I passed the cbsa exam with flying colors, thanks to killexams.com Questions and Answers and exam simulator. The exam was tough, but their study material made my life a lot easier. The exam simulator provided by killexams.com is a gift, and I enjoyed the questions and answers as well as the practice exams of different types, as they were the most effective approach to learning. |
User: Lev*****![]() ![]() ![]() ![]() ![]() With two weeks left for my CBSA exam, I felt helpless due to my wrong practices. I needed to pass the exam to change my job, but my worries were eliminated when I discovered the questions and answers provided by Killexams.com. The rich and unique content of the guide, along with the easy and brief answers, helped me understand the topics with ease. The CBSA official Cert guide also came in handy. |
Features of iPass4sure CBSA Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 200 Q&A
Get Full VersionAll BlockChain Exams
BlockChain ExamsCertification and Entry Test Exams
Complete exam list