Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CBSP BTA Certified Blockchain Security Professional Questions and Answers

Questions 4

If an attacker can find two values that hash to the same output what is it called?

Options:

A.

Match

B.

Intersection

C.

Collision

D.

Correlation

Buy Now
Questions 5

Which of the following attacks were enabled by design decisions made by the blockchain ' s developers? Select all that apply

Options:

A.

Bitcoin

B.

EOS

C.

Verge

D.

List

Buy Now
Questions 6

Which of the following blockchains best implements need-to-know tor blockchain data?

Options:

A.

Ethereum

B.

Corda

C.

Hyperledger

Buy Now
Questions 7

Which blockchain security control either risks centralization or permanently divergent chains?

Options:

A.

Random Neighbor Selection

B.

Permissioned Blockchains

C.

Checkpoints

D.

Private Blockchains

Buy Now
Questions 8

Which of the following is a takenaway from the pigeocoin/Bitcom Core hack?

Options:

A.

Importance of scaning code for common vulnerabilities

B.

Importance of cryptanalysis of algorithms used

C.

Import of system-level analysis

D.

Import of a robust change management process

Buy Now
Questions 9

The code of smart contracts that are " self-destructed " is no longer visible to the blockchain network

Options:

A.

True

B.

False

Buy Now
Questions 10

Which of the following blockchain consensus algorithms is the most sustainable long-term?

Options:

A.

Proof of Stake

B.

Proof of Work

C.

Proof of Burn

D.

Proof of Space

Buy Now
Questions 11

The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its vulnerability to traditional Denial of Service attacks

Options:

A.

True

B.

False

Buy Now
Questions 12

The decentralization of the blockchain makes it immune to traditional Denial of Service attacks

Options:

A.

True

B.

False

Buy Now
Questions 13

Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.

Options:

A.

Scale

B.

Efficiency

C.

Access Control

D.

Decentralization

Buy Now
Questions 14

This sample code is vulnerable to which of the following attacks? Select all that apply.

Options:

A.

Reentrancy

B.

Unchecked Return Values

C.

Arithmetic

D.

Race Conditions

Buy Now
Questions 15

Both sidechains and slate channels rely on the original blockchain for security and as a fallback if issues occur.

Options:

A.

True

B.

False

Buy Now
Questions 16

Which smart contract auditing strategy identities which variables in the function can be affected by the person running it?

Options:

A.

Manual Code Analysis

B.

Symbolic Execution

C.

Taint Analysis

D.

Control Flow Analysis

Buy Now
Questions 17

Sidechains can benefit the mainchain in what ways? Select all that apply

Options:

A.

Speed

B.

Functionality

C.

Scalability

D.

Security

Buy Now
Questions 18

Poorly designed smart contracts can only be disabled on the blockchain if this functionality was built in from the beginning

Options:

A.

True

B.

False

Buy Now
Questions 19

The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms

Options:

A.

True

B.

False

Buy Now
Questions 20

In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain and race to make their chain longer than the real chain?

Options:

A.

Selfish Mining Attack

B.

Long-Range Attack

C.

Double-Spend Attack

D.

51% Attack

Buy Now
Questions 21

Which of the following are good ways to get pseudo-random numbers for smart contracts?

Options:

A.

Private variables

B.

Private functions

C.

Block hashes

D.

External oracle

Buy Now
Questions 22

Which of the following is designed to allow someone to prove they know a secret without revealing it?

Options:

A.

Confidential Transaction

B.

Ring Signature

C.

Zero-Knowledge Proof

D.

Stealth Address

Buy Now
Questions 23

Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data

Options:

A.

True

B.

False

Buy Now
Questions 24

For which of the following attacks is a permissioned or private blockchain the best solution?

Options:

A.

Routing

B.

Denial of Service

C.

Replay

D.

Sybil

Buy Now
Questions 25

Transactions can be added to DAG-based distributed ledgers without being validated but the same is not true for blockchain.

Options:

A.

True

B.

False

Buy Now
Questions 26

Which of the following blockchains uses a channel-focused architectural design?

Options:

A.

Ethereum

B.

Corda

C.

Hyperledger

Buy Now
Questions 27

Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.

Options:

A.

True

B.

False

Buy Now
Exam Code: CBSP
Exam Name: BTA Certified Blockchain Security Professional
Last Update: Apr 30, 2026
Questions: 91

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CBSP testing engine

PDF (Q&A)

$43.57  $124.49
buy now CBSP pdf