Which blockchain security control either risks centralization or permanently divergent chains?
A. Random Neighbor Selection
B. Permissioned Blockchains
C. Checkpoints
D. Private Blockchains
Which smart contract vulnerability allows an attacker to make a profit off a smart contract cryptocurrency exchange like Bancor?
A. Arithmetic
B. Access Control
C. Race Conditions
D. Reentrancy
Quantum computers threaten traditional cryptography because they provide polynomial solutions to mathematically "hard" problems.
A. True
B. False
Which of the following are common inputs to the algorithm to select the next block creator in Proof of Stake? Select all that apply
A. Age of User Account
B. Time Since Last Chosen to Create a Block
C. Stake Size
D. User Activity on the Blockchain
This sample code is vulnerable to which of the following attacks? Select all that apply.
A. Unchecked Return Values
B. Arithmetic
C. Short Address
D. Reentrancy
What is the easiest way to steal cryptocurrency from a user?
A. Private key theft
B. Double-spend attack
C. Consensus hijacking
D. Eclipse attack
E. None of the above
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
A. Bitcoin
B. EOS
C. Verge
D. List
Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply
A. Randomness
B. Large State Space
C. One-Way
D. Non-Locality
Stealth addresses are designed to do which of the following?
A. Conceal transaction amount
B. Conceal transaction recipient
C. Conceal transaction sender
D. Conceal shared secret
Checkpointing is designed to protect against an attacker exploiting the mechanism by which blockchain resolves divergent chains.
A. True
B. False