Download BTA Certified Blockchain Solution Architect.CBSA.CertKiller.2019-10-22.137q.vcex

Vendor: Blockchain
Exam Code: CBSA
Exam Name: BTA Certified Blockchain Solution Architect
Date: Oct 22, 2019
File Size: 360 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
SHA-1 is the most commonly used SHA algorithm, and produces a ______-byte hash value(size).
  1. 256
  2. 128
  3. 32
  4. 20
Correct answer: D
Explanation:
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value. Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value. 
Reference: https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting
Question 2
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)
  1. 1,000,000,000,000,000,000
  2. 1,000,000,000,000,000
  3. 1,000,000,000
  4. 10,000
  5. 1,000,000,000,000
Correct answer: AB
Explanation:
Reference: http://www.btcsatoshi.com/
Reference: http://www.btcsatoshi.com/
Question 3
In the Proof of Stake(POS) algorithm the miners are really known as ___________?
  1. Notary
  2. Oracle
  3. Forgers
  4. Minters
Correct answer: C
Explanation:
Proof of Stake has the same goal as proof of work—to validate transactions and achieve consensus in the chain—and it uses an algorithm but with a different process. With proof of stake, the creator of a new block “is chosen in a deterministic way, depending on its wealth, also defined as a stake.” Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum co-founder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.  Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Proof of Stake has the same goal as proof of work—to validate transactions and achieve consensus in the chain—and it uses an algorithm but with a different process. With proof of stake, the creator of a new block “is chosen in a deterministic way, depending on its wealth, also defined as a stake.” Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum co-founder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.  
Reference: http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Question 4
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires________. 
What is required?
  1. Consensus
  2. Crypthography
  3. Bandwidth
  4. Availability
Correct answer: A
Explanation:
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. Reference: https://en.wikipedia.org/wiki/Byzantine_fault_tolerance
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus. 
Reference: https://en.wikipedia.org/wiki/Byzantine_fault_tolerance
Question 5
A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.  
What is the cipher type?
  1. Stream
  2. Block
  3. Parallel
  4. RSA
Correct answer: A
Explanation:
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time. Reference:https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time. 
Reference:
https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question 6
What is a logic gate in electronics and computer science?
  1. A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be both 1 and 0.
  2. A logic gate usually takes in 3 inputs and gives out 2 output. The inputs and outputs are binary values, meaning they can be 1 or 0.
  3. A logic gate usually takes in 2 inputs and gives out 6 output. The inputs and outputs are binary values, meaning they can be both 1 and 0.
  4. A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0.
Correct answer: D
Explanation:
A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0. A XOR logic gate takes in 2 binary inputs and gives out a high output ONLY when the inputs are different. Meaning, if A and B are inputted to a XOR gate then the out C will be 1 ONLY when A is not equal to B.  Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0. A XOR logic gate takes in 2 binary inputs and gives out a high output ONLY when the inputs are different. Meaning, if A and B are inputted to a XOR gate then the out C will be 1 ONLY when A is not equal to B.  
Reference: https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question 7
Ethereum is considered to be a ______________type of blockchain.
  1. Permissionless
  2. Permission Based
  3. Hybrid
  4. Private
Correct answer: A
Explanation:
Permissionless - anyone can join Anyone can run a node, run mining software/hardware, access a wallet and write data onto and transact within the blockchain (as long as they follow the rules of the bitcoin blockchain). There is no way to censor anyone, ever, on the permissionless bitcoin blockchain.  Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Permissionless - anyone can join Anyone can run a node, run mining software/hardware, access a wallet and write data onto and transact within the blockchain (as long as they follow the rules of the bitcoin blockchain). There is no way to censor anyone, ever, on the permissionless bitcoin blockchain.  
Reference: https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Question 8
Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda. 
What is the best answer?
  1. R3 Corda is a pluggable blockchain and allows the enterprise flexibility
  2. R3 Corda is a byzantine fault tolerant blokchain
  3. R3 Corda is a proof of stake based blockchain
  4. R3 Corda is a proof of work based blockchain
Correct answer: A
Explanation:
Corda does not share the same requirements as Bitcoin: we require absolute certainty over transaction finality and we need to know who our counterparts are. So we had the freedom – and took this opportunity – to solve the consensus problem in a different way. In particular, Corda solves the privacy issue in a number of manners, primarily by allowing for separation of consensus into a service which we call the Notary Cluster. Corda was designed for business from the start. It has no cryptocurrency built into the platform and does not require mining-style consensus, which imposes great cost with little business benefit.
Corda does not share the same requirements as Bitcoin: we require absolute certainty over transaction finality and we need to know who our counterparts are. So we had the freedom – and took this opportunity – to solve the consensus problem in a different way. In particular, Corda solves the privacy issue in a number of manners, primarily by allowing for separation of consensus into a service which we call the Notary Cluster. Corda was designed for business from the start. It has no cryptocurrency built into the platform and does not require mining-style consensus, which imposes great cost with little business benefit.
Question 9
Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes). Select best answer.
  1. NSA is spying on us so what’s it matters.
  2. Depends on input
  3. False
  4. True
Correct answer: D
Explanation:
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes).  Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes).  
Reference: https://medium.com/all-things-ledger/bitcoins-implementation-of-blockchain-2be713f662c2
Question 10
In the Ethereum EVM there are two types of memory areas. (Select two.)
  1. Storage
  2. Database
  3. Memory
  4. Persistent
  5. Ephemeral
Correct answer: AC
Explanation:
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
Reference: https://solidity.readthedocs.io/en/latest/introduction-to-smart-contracts.html#the-ethereum-virtual-machine
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!