MCQ With Answers
MCQ With Answers
B) A type of cryptocurrency
B) A computer on a blockchain
D) An exchange of cryptocurrencies
A) Nobody
B) Everybody
Q5. When a record is submitted in a blockchain, how can you alter it?
A) You need the public and private key to modify the record
A) A cryptographic algorithm
A) Decentralized ledger
B) Distributed ledger
B) Computer code running on top of a blockchain containing a set of rules under which the
parties to that smart contract agree
Q12. What is the name of the language used within Ethereum to implement smart
contracts?
A) Python
B) Solidity
C) Java
D) Algol 68
C) A decentralized application
A) Hashing
B) Public key
C) Passphrase
D) Private key
Q16. When is there a consensus?
A) When, in a smart contract, the private key and the public key match
C) When several nodes (usually most nodes on the network) all have the same blocks
in their locally validated best blockchain
A) Any mechanism that allows tokens to be securely transferred from one blockchain
to another blockchain
B) The copy of all the nodes of a blockchain in a parallel blockchain for security reasons
C) The name of the new blockchain generated by the fork of an existing blockchain
C) The technical standard used for smart contracts on the Ethereum blockchain for
implementing tokens
D) The European Central Bank governance standard controlling the value of the bitcoin
Q20. What is a DAO?
A) It does not use disinterested third parties to secure blocks, as all participants have a
vested interest.
B) It is more resilient against fraud, because it uses federated nodes to combat fraud.
D) Its networks are built by for-profit companies and the working of the network is
guaranteed.
A) Full node
B) Lightweight node
C) Merkle node
D) Miner node
Q25. A bearer instrument used to transfer value between two parties over a blockchain
network. What is this instrument?
A) A DApp
B) A hash
C) A node
D) A token
B) In public-key cryptography, one key is used to encrypt and decrypt transactions. The
sender uses this key to send cryptocurrency, and the recipient’s wallet holds it after
decryption.
D) The algorithm in the blockchain encrypts and stores private and public keys to all user's
wallets. The user then accesses their funds through their twenty-word passphrase key.
A) Through a central controller ensuring the security of each node in the network
B) Through a Proof of Work (PoW) algorithm, which allows miners to secure the network
C) Through incentivization, where miners receive currency for securing the network
D) Through Merkle tree roots, that allow the network to restore itself to its last valid
block
Q30. Which of the following is not an appropriate way of targeting a mobile phone for
hacking?
Q31. How can blockchain technology best help secure identity data?
a) By eliminating third parties through providing secured-data storage at a user’s server
b) By encoding all the health data and saving it on a private and permissionless blockchain
c) By protecting data that has been submitted on the internet using a cryptographic
algorithm
d) By providing information personal data without disclosing the actual data that
proves it
Q32. What is the value of using blockchain networks with the Internet of Things (IoT)?
a) Allowing blockchain users to follow self-driving cars and access these cars
b) Avoiding a spoofing attack using the secured identity that is stored on a blockchain
c) Enabling software that programs itself to solve problems without human intervention
d) Solving expensive and complex calculations using Hyperledger Fabric mining
Q40. Why is blockchain described as the technology that adds a layer of trust to the
internet?
a) It allows individuals and groups to work together without having to trust each other
or establish authority.
b) It creates a dedicated virtual private network (VPN) tunnel between two or more parties
to carry out online fund transfers.
c) It provides a mechanism for the government to create their own digital fiat currency as a
replacement for physical currency.
d) It provides multifactor authentication to create and update records of cryptocurrency
transactions securely.
b) A digital ledger that is created and managed by a company but is made available to the
public
c) A hard wallet
d) An email address
a) A cryptocurrency exchange
b) A computer or device connected to other computers or devices that all hold a copy of a
blockchain
A) They hold a record of all transactions that have ever occurred on a network.
A) Miners act as a single third party to aggregate records and provide trust in the network by
the miners’ authority.
B) Miners are computers that allow access to the blockchain, ensuring the number of
corrupt nodes will stay low.
C) Miners are nodes that compete for a reward by calculating the correct nonce to
make a transaction possible.
D) Miners determine the consensus rules that should be followed and interfere when these
rules are broken.
Q47. Which description fits only the Proof of Work (PoW) consensus algorithm?
C) A consensus algorithm, where the validation is done for the entire transaction flow,
including not only the correctness, but also the sequence of transactions.
G) An algorithm that works in a trusted execution environment and proves the time when
the transaction has taken place.
H) An intensive and expensive, competitive algorithm where each mining node on the
blockchain is competing to secure blocks.
B) Proof of Burn
A) PoET can often be used in a permissionless blockchain more easily than PoW, because
PoET’s lottery system for node selection is secure.
B) PoET has generally lower transaction costs than PoW, because the hardware needed is
more generic than the hardware needed for PoW.
C) PoET is much more secure than PoW, because PoET supports the trusted execution
environment (TEE) by time-stamping the transactions.
D) PoET is usually faster than PoW, because fewer nodes compete for validation than
in PoW, since PoET randomly selects the nodes.
A) The attacker changed the transaction on his node and propagated it in the network.
B) The attacker edited the smart contract and recovered investor’s cryptocurrency.
C) The attacker gained control of more than 51% of the network’s computing power.
D) The attacker hard-forked the network and created a new blockchain network.
Q52. Blockchain networks are vulnerable to 51% attacks. Which network would
incentivize hackers most to break the network?
A) Bitcoin
B) Fabric
C) Ripple
Q53. One of the greatest threats to the blockchain community is the narcissism of
small differences. What is the result of this narcissism of small differences?
A) One community group makes fun of another community group over small differences,
resulting in greater collaboration.
B) The community cares about and works to resolve small differences that cannot be
perceived by outside groups.
C) The community has developed many similar projects and these fight with one
another over small differences.
D) The community has grown closer and works together in a collaborative fashion to solve
common problems.
A) A fraudster convinces a victim to pay for receiving something of greater value later on.
B) A fraudster finds investors, then dumps the tokens of the investors to crash the market.
D) A fraudster steals credit cards and uses them to buy money, goods or property.
A) The greater the number of full independent nodes, the harder it is to compromise
the data in the blockchain.
B) The lower the number of miners in the blockchain, the higher the incentive is for securing
the network.
C) The more centralized the control of the blockchain is, the harder it is to secure the data
and avoid fraud.
D) The more complicated the Proof of Work (PoW) algorithm is, the more rewarding it is to
secure the network.
D) By using distributed ledger technology (DLT), which records transactions at the source
C) A person sends a transaction over a public network to earn rewards as a public witness.
D) A preferred node can be elected to attest to the accuracy and truthfulness of
information.
A) It enables centralized third parties to offer easy-to-use and valid identity information.
B) It enables each person to have exclusive control of their money, property and
identity.
Q59. Public blockchains give an incentive to encourage users to mine blocks and
secure the network. What incentive is this?
B) Public blockchains do not offer rewards, because they are open source.
A) A hybrid blockchain
B) A private blockchain
C) A public blockchain
A) It is a public blockchain network and one of the oldest networks, existing since 2009.
B) It is private, open sourced and can run everyone’s own distributed ledger
technology (DLT).
D) It utilizes the Proof of Stake (PoS) consensus algorithm as its main security measure.
Q62. What is the best use case for smart contracts?
A) Digitalize and automate legally binding contracts using artificial intelligence (AI)
D) Extend the Bitcoin blockchain, the best-known smart contract platform, to the judicial
system
Q63. In which scenario is a smart contract the best solution to the problem?
B) A chief financial officer wants her smart watch to notify her when her partner enters their
front door.
C) An energy company wants to automatically buy power when the price reaches a
predetermined rate.
D) An insurance company wants to pay out a farmer whenever the case manager feels it is
best to do so.
A) Execute smart contracts with the business logic in the front-end of a standalone
application
B) Manage cryptocurrencies only, without any embedded voting system for governance of
the blockchain
D) Support applications that run on multiple public cloud providers avoiding any vendor
lock-in and fraud
B) Embed regulated online smart contracts with the current judicial system, using public
blockchains
C) Offer complex online smart contracts without any link to tangible and intangible offline
assets
D) Provide a private blockchain contract platform on which users can run their online
applications
Q66. How can blockchain technology best help secure identity data?
B) By encoding all the health data and save it on a private and permissionless blockchain
C) By protecting data that has been submitted on the internet using a cryptographic
algorithm
D) By providing information personal data without disclosing the actual data that
proves it
Q67. What is the value of using blockchain networks with the Internet of Things (IoT)?
A) Allowing blockchain users to follow self-driving cars and access these cars
B) Avoiding a spoofing attack using the secured identity that is stored on a blockchain
C) Enabling software that programs itself to solve problems without human intervention
Q73. How does blockchain technology help to protect intellectual property rights (IP)?
A) China has created a regulatory sandbox that allows them to closely monitor the
experiments in blockchain mining and create their own cryptocurrency.
B) Estonia offers e-Residency software, which is available to anyone in the world interested
in operating a business online and from within the European Union.
C) Singapore’s Monetary Authority (MAS) is creating central bank digital money for
payments between banks using distributed ledger technology (DLT).
Q75. Why is blockchain described as the technology that adds a layer of trust to the
internet?
A) It allows individuals and groups to work together without having to trust each other
or establish authority.
B) It creates a dedicated virtual private network (VPN) tunnel between two or more parties
to carry out online fund transfers.
C) It provides a mechanism for the government to create their own digital fiat currency as a
replacement for physical currency.
Q80. What are the types of functions you can find in Solidity?
A) Public and private
B) Internal and external
C) Function and contract
D) None of the above
Q87. Which of the following options does not qualify as an Ethereum client?
A) Remote client
B) Full client
C) SPV client
D) Light client
Q90. What does the Solidity compiler create during smart contract processing?
A) Application Binary Interface
B) Bytecode
C) Both of the above
D) None of the above