Blockchain BTA Certified Blockchain Security Professional - CBSP Exam Practice Test
This sample code is vulnerable to which of the following attacks? Select all that apply


Correct Answer: D
Vote an answer
Ring signatures are designed to do which of the following?
Correct Answer: D
Vote an answer
Which of the following features were exploited as part of the Verge cryptocurrency hack? Select all that apply.
Correct Answer: B,D
Vote an answer
Malware infections of blockchain nodes can compromise the security of the blockchain's consensus algorithm.
Correct Answer: B
Vote an answer
Decentralization is an organizational risk due to decreased control over the organization's data.
Correct Answer: B
Vote an answer
Scanning against a list of common vulnerabilities is an important component of smart contract auditing.
Correct Answer: B
Vote an answer
Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.
Correct Answer: B
Vote an answer
A controversial update to blockchain functionality could increase the vulnerability of the blockchain to attack
Correct Answer: B
Vote an answer
This sample code is vulnerable to which of the following attacks? Select all that apply.
Correct Answer: A,B,C
Vote an answer