If an attacker can find two values that hash to the same output what is it called?
Which of the following attacks were enabled by design decisions made by the blockchain ' s developers? Select all that apply
Which of the following blockchains best implements need-to-know tor blockchain data?
Which blockchain security control either risks centralization or permanently divergent chains?
The code of smart contracts that are " self-destructed " is no longer visible to the blockchain network
Which of the following blockchain consensus algorithms is the most sustainable long-term?
The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its vulnerability to traditional Denial of Service attacks
The decentralization of the blockchain makes it immune to traditional Denial of Service attacks
Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.
This sample code is vulnerable to which of the following attacks? Select all that apply.
Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.
Which smart contract auditing strategy identities which variables in the function can be affected by the person running it?
Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built in from the beginning
The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms
In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?
Which of the following are good ways to get pseudo-random numbers for smart contracts?
Which of the following is designed to allow someone to prove they know a secret without revealing it?
Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data
For which of the following attacks is a permissioned or private blockchain the best solution?
Transactions can be added to DAG-based distributed ledgers without being validated but the same is not true for blockchain.
Which of the following blockchains uses a channel-focused architectural design?
Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.