Prev Next Question 36/65 - CBSA.v2019-06-10

The key difference between encryption and hashing is that encrypted strings can be reversed back into their original decrypted form if you have the right key?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (65q)
Question 1: An _____________ is a well-known service that signs transact...
Question 2: Which of the following enterprise blockchains have a pluggab...
Question 3: Blockchains are decentralized ledgers which, by definition, ...
Question 4: Which of the following is NOT considered a token?...
Question 5: When writing and considering push and pull in a smart contra...
Question 6: In Hyperledger, nodes need a ________________ to be able to ...
Question 7: When considering tokens on the Ethereum Blockchain what is t...
Question 8: Regarding Ethereum contracts, the contracts can call (perfor...
Question 9: Chaincode is a decentralized transactional program, running ...
Question 10: A centralized system is one that that is governed by a hiera...
Question 11: What component on the blockchain maintains the "world state"...
Question 12: Composer Modeling Language is an object-oriented modeling la...
Question 13: The difference between Ethereum tokens and a standalone curr...
Question 14: A ____________cipher basically means it is using a fixed key...
Question 15: What are two specific advantages of using Hyperledger Fabric...
Question 16: R3 Corda does not organize time into blocks. What does Corda...
Question 17: The most popular Ethereum development framework is currently...
Question 18: Addresses on a blockchain are derived by a process of hashin...
Question 19: In the Proof of Stake(POS) algorithm the miners are really k...
Question 20: What type of peer node executes transactions?...
Question 21: Gas has multiple associated terms with it: Gas Prices, Gas C...
Question 22: When you are developing with Fabric Composer which of the fo...
Question 23: Contracts live on the blockchain in an Ethereum-specific bin...
Question 24: You currently on a conference call with an executive from a ...
Question 25: You would like to run Ethereum DApps in a browser without a ...
Question 26: In Hashcash, miners all compete to look for a so called. "__...
Question 27: What type of "bug" generally occurs when something isn't rig...
Question 28: You are considering writing a smart contract for Ethereum an...
Question 29: In the EVM every account has a persistent key-value store ma...
Question 30: When developing in Ethereum which is considered to be an In-...
Question 31: Your company working for is now considering the blockchain. ...
Question 32: In Ethereum the difficulty adjustment algorithm is coded in ...
Question 33: What is a logic gate in electronics and computer science?...
Question 34: The ____________of the tree is the topmost node and hence th...
Question 35: There are two types of tokens in blockchain solutions. (Sele...
Question 36: The key difference between encryption and hashing is that en...
Question 37: Which of the following is considered the most popular public...
Question 38: What type of encryption is shown below and is commonly used ...
Question 39: Blockchain provenance is defined as _______________?...
Question 40: What does the 20 in ERC20 mean or relate to?...
Question 41: You are currently consulting with an organization that ships...
Question 42: Looking the graph below, what type of an attack is this like...
Question 43: Hyperledger Composer has following two main components?...
Question 44: What is the difference in using Go-Ethereum over Ganache?...
Question 45: With Hyperledger Fabric ledger, it supports both levelDB / C...
Question 46: Fabric Ledger has two specific parts. Select answer with the...
Question 47: Smart Contracts provide all the following benefits EXCEPT?...
Question 48: Ethereum is considered to be a ______________type of blockch...
Question 49: What is the language that Solidity is using to build on the ...
Question 50: In what year did a whitepaper that was published by "Satoshi...
Question 51: When specifying blockchain technologies, it is important to ...
Question 52: Your customer is an enterprise that is focused on financial ...
Question 53: A Byzantine failure is the loss of a system service due to a...
Question 54: Hyperledger is an enterprise focused blockchain project. Thi...
Question 55: You are using Truffle for an Ethereum contract and would lik...
Question 56: Ethereum currently uses the ___________Consensus Algo and in...
Question 57: The gas price is a value set by the creator of the blockchai...
Question 58: Secure Hash Algorithm (SHA-256) output is always 256 bits or...
Question 59: How many peers in the network need to endorse a transaction ...
Question 60: Smart Contracts are generally written in specific programmin...
Question 61: You have flown to NYC to have a discussion with a technical ...
Question 62: In Ethereum how is the block difficulty determined in Ethere...
Question 63: ___________is advantageous because it presents scalability a...
Question 64: ___________________ensures that the shared ledgers are exact...
Question 65: Your company is looking to develop a new token and raise fun...