March Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! CBSA BTA Certified Blockchain Solution Architect is now Stable and With Pass Result

CBSA Practice Exam Questions and Answers

BTA Certified Blockchain Solution Architect

Last Update 17 hours ago
Total Questions : 229

CBSA is stable now with all latest exam questions are added 17 hours ago. Just download our Full package and start your journey with Blockchain BTA Certified Blockchain Solution Architect certification. All these Blockchain CBSA practice exam questions are real and verified by our Experts in the related industry fields.

CBSA PDF

CBSA PDF (Printable)
$48
$119.99

CBSA Testing Engine

CBSA PDF (Printable)
$56
$139.99

CBSA PDF + Testing Engine

CBSA PDF (Printable)
$70.8
$176.99
Question # 1

Ethereum has a metric system of denominations used as units of ether.

What is the smallest denomination of Ether?

Options:

A.  

Kwei

B.  

Shannon

C.  

Wei

D.  

Finney

Discussion 0
Question # 2

In Hyperledger there are three distinct types of nodes.

What are the three types of nodes? (Select three.)

1. Client Node: That initiates the transaction

2. Peer Nodes: Commits Transaction & keeps the data in sync across the ledger

3. Ordered: They are the communication backbones and responsible for the distribution of

the transactions.

Options:

A.  

Client Node

B.  

Ordered Node

C.  

Certificate Node

D.  

Anchor

E.  

Peer Node

Discussion 0
Question # 3

In Hashcash, miners all compete to look for a so called. "____________"which, if provided as input (together with other parts of a block header) to a hash function, yields an output that’s numerically small enough to claim the next block reward.

Options:

A.  

Difficulty bits

B.  

Nonce

C.  

Merkle Root

D.  

Timestamp

Discussion 0
Question # 4

Which of these technical components best represents why cryptocurrency is able to operate successfully?

Options:

A.  

An immutable digital ledger that is validated and distributed across many peers

B.  

Using API calls, cryptocurrency having a direct correlation to USD exchange rates

C.  

High performance computing power allows cryptocurrency to be minted just as a central government might do with fiat currency

D.  

Blockchain cryptocurrency transactions are always public which generates user trust and adoption

Discussion 0
Question # 5

In Ethereum the difficulty adjustment algorithm is coded in the ___________ file.

Options:

A.  

calcDifficultyFrontier

B.  

block_validator.go

C.  

calcDifficultyHomestead

D.  

calcDifficultyvalidator.go

Discussion 0
Question # 6

Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes). Select best answer.

Options:

A.  

NSA is spying on us so what’s it matters.

B.  

Depends on input

C.  

False

D.  

True

Discussion 0
Question # 7

What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

Options:

A.  

51% Attacks

B.  

Tether Token Hack

C.  

DDoS Attack

D.  

BIP attack

E.  

Parity Wallet Attack

Discussion 0
Question # 8

The most popular Ethereum development framework is currently Truffle.

What are three features of Truffle? (Select three.)

Options:

A.  

Scriptable deployment & migrations framework.

B.  

Automated contract testing with Mocha and Chai.

C.  

Takes Dapp transactions via Ws-rpc, json-rpc, ipc-rpc.

D.  

Built-in smart contract compilation, linking, deployment and binary management.

E.  

Automated contract testing with Mocha only

Discussion 0
Question # 9

Which of the following blockchain is NOT a permissioned blockchain?

Options:

A.  

Quantum

B.  

Ethereum

C.  

R3 Corda

D.  

Ripple

E.  

Hyperledger

Discussion 0
Question # 10

In Ethereum a block contains two very important parameters. (Select two.)

Options:

A.  

Difficulty

B.  

Release date

C.  

Block number

D.  

Timestamp

Discussion 0
Question # 11

What is the nonce-field in a transaction?

Options:

A.  

To sum up all ethers sent from that address

B.  

Protects against replay attacks

C.  

To distribute the workloads in the EVM

D.  

Adds a checksum for transactions

Discussion 0
Question # 12

Public blockchains can alter the blockchain ledger by:

Options:

A.  

Creating a hard fork of the blockchain data, tooling and/or software

B.  

Achieving community consensus via a Smart Contract to update the ledger

C.  

Re-hashing the blocks from the total block height down to the genesis block

D.  

Blockchain ledgers are immutable and can never be altered

Discussion 0
Question # 13

Looking the graph below, what type of an attack is this likely?

Question # 13

Options:

A.  

51% Attack

B.  

P+ Epsilon Attack

C.  

Blacklisting

D.  

Selfish Mining Attack

Discussion 0
Question # 14

Smart Contracts provide all the following benefits EXCEPT?

Options:

A.  

Legally Enforcable

B.  

Autonomy

C.  

Cast Savings

D.  

Efficiency

E.  

Backup

Discussion 0
Question # 15

Which of the following enterprise blockchain platforms does not have smart contract functionality?

Options:

A.  

Ethereum

B.  

Quorum

C.  

R3 Corda

D.  

Hyperledger Fabric

E.  

Ripple

Discussion 0
Question # 16

You are considering writing smart contracts and there are a few different languages you can consider. (Select two.)

Options:

A.  

Truffle

B.  

Serpent

C.  

Solidity

D.  

Embark

Discussion 0
Question # 17

When specifying blockchain technologies, it is important to understand its benefits and its challenges.

What would be two challenges of blockchain technology adoption to an enterprise? (Select two.)

Options:

A.  

Scalability, transaction speed / cost

B.  

Tokenization of platforms

C.  

Distributed

D.  

Very New Technology

Discussion 0
Question # 18

What type of "bug" generally occurs when something isn’t right according to business requirements?

Options:

A.  

Business logic

B.  

Business Requirements

C.  

Integration

D.  

Accessibility

E.  

Security

Discussion 0
Question # 19

By design, permissioned blockchains such as Hyperledger Fabric are not capable of creating or utilizing cryptocurrency.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 20

How are "assets" in Hyperledger Fabric represented? (Select two.)

Options:

A.  

JSON

B.  

Node

C.  

YAML

D.  

Binary

E.  

Deployment Manager

Discussion 0
Question # 21

The block creation time is set to how many minutes in Bitcoin? 

Options:

A.  

1

B.  

10

C.  

120

D.  

100

E.  

15

F.  

150

Discussion 0
Question # 22

What type of encryption is shown below and is commonly used in blockchain cryptography? 

Question # 22

Options:

A.  

Diffie-Hellman

B.  

Asymmetric Encryption

C.  

Synchronous

D.  

Asynchronous

E.  

Symmetric Encryption

Discussion 0
Question # 23

There are two types of tokens in blockchain solutions. (Select two.)

Options:

A.  

Legal

B.  

Utility

C.  

Equity

D.  

Financial

Discussion 0
Question # 24

A private blockchain like Hyperledger would be the right choice for which scenario:

Options:

A.  

An enterprise that needs to build a scalable, secure, permissioned blockchain application

B.  

A network of family members who want to share passwords and other secure information with one another

C.  

Developers who want to rapidly prototype public blockchain solutions

D.  

A startup that desires to build a token and blockchain application for their users

E.  

All of the above

Discussion 0
Question # 25

By default, who can see transaction details on a public/open blockchain?

Options:

A.  

The initiator

B.  

Everyone

C.  

The recipient of a transaction

D.  

The network owner / administrator

Discussion 0
Question # 26

What are two reasons that you would consider implementing a POW algo in your blockchain? (Select two.)

Options:

A.  

PoW imposes no limits on actions in the network and therefore can thwart attacks better than other algos due to high cost

B.  

What matters is to have large computational power to solve the puzzles and form new blocks over having a financial stake.

C.  

PoW imposes some limits on actions in the network and therefore can thwart attacks better than other algos due to high cost

D.  

The algo is energy efficient compared to POS and BFT

E.  

The algo is energy efficient compared to POS and DPOS

Discussion 0
Question # 27

The gas price is a value set by the creator of the blockchain transaction? (Select best answer.)

Options:

A.  

FALSE

B.  

Its Negotiable

C.  

TRUE

Discussion 0
Question # 28

Regarding Ethereum contracts, the contracts can call (perform) two specific message calls. The message calls are either _____________ or __________? (Select two.)

Options:

A.  

Bitcoin nodes

B.  

Send Ether to non-contract

C.  

DApps

D.  

Other contracts

E.  

Ether Nodes

Discussion 0
Question # 29

In common blockchain design, identity and transaction approval is possible through:

Options:

A.  

AES encryption

B.  

Public key cryptography

C.  

Secret key cryptography

D.  

None of the above

Discussion 0
Question # 30

In the EVM every account has a persistent key-value store mapping 256-bit words to 256-bit words called ________

Options:

A.  

Gas

B.  

Space

C.  

Storage

D.  

Datastore

E.  

Database

Discussion 0
Question # 31

Every node needs to keep track of time AND it needs to be in synch with its other peer nodes on the blockchain. In Bitcoin for example the current median for time is around?

Options:

A.  

7 minutes

B.  

7 seconds

C.  

17 seconds

D.  

70 Minutes

E.  

70 Seconds

Discussion 0
Question # 32

Consider the following scenario: A solo app developer wants to create their own cryptocurrency and build a blockchain based that allows users to buy and sell second-hand items with that cryptocurrency from each other. Before the transaction is considered complete, the purchaser must put the funds in an escrow service and the sender must enter the courier tracking number into that same escrow. Time is of the essence and this developer doesn’t want to worry about networking of infrastructure. This app must be fully autonomous or “decentralized”.

Which architecture would best solve the product need?

Options:

A.  

Ethereum for token creation and escrow service; User-facing features built with web technologies and deployed through IPFS

B.  

Ethereum for token creation; Traditional multitier API and database for escrow service; User-facing features built in web technologies then minified unto a String and deployed to an Ethereum Smart Contract

C.  

Hyperledger Fabric for the escrow service and token creation using chaincode; User-facing features built with Hyperledger Composer

D.  

The product cannot be built. Fully decentralized apps are not yet possible for user interface

Discussion 0
Question # 33

The___________________ is the runtime environment for smart contracts in Ethereum?

Options:

A.  

Metamask

B.  

Ether

C.  

Mist

D.  

EVM

Discussion 0
Question # 34

A product’s supply chain data is stored on blockchain. Only members of the product supply chain can write announcements to the blockchain but any consumer can query this data in a store to learn more about the product they want to buy. This is an example of a ____/____ blockchain.

Options:

A.  

public /closed

B.  

private / open

C.  

private / closed

D.  

public / open

Discussion 0
Get CBSA dumps and pass your exam in 24 hours!

Free Exams Sample Questions