The key difference between encryption and hashing is that encrypted strings can be reversed back
into their original decrypted form if you have the right key?
A
What is a logic gate in electronics and computer science?
D
Explanation:
A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary
values, meaning they can be 1 or 0. A XOR logic gate takes in 2 binary inputs and gives out a high
output ONLY when the inputs are different. Meaning, if A and B are inputted to a XOR gate then the
out C will be 1 ONLY when A is not equal to B.
Ethereum is considered to be a ______________type of blockchain.
A
Explanation:
Permissionless - anyone can join Anyone can run a node, run mining software/hardware, access a
wallet and write data onto and transact within the blockchain (as long as they follow the rules of the
bitcoin blockchain). There is no way to censor anyone, ever, on the permissionless bitcoin blockchain.
Your company working for is now considering the blockchain. They would like to perform a POC with
R3 Cord
a. The CIO was reading about different blockchain consensus algos and would like to understand
what type of consensus algos is used with Corda.
What is the best answer?
A
Explanation:
Corda does not share the same requirements as Bitcoin: we require absolute certainty over
transaction finality and we need to know who our counterparts are. So we had the freedom – and
took this opportunity – to solve the consensus problem in a different way. In particular, Corda solves
the privacy issue in a number of manners, primarily by allowing for separation of consensus into a
service which we call the Notary Cluster. Corda was designed for business from the start. It has no
cryptocurrency built into the platform and does not require mining-style consensus, which imposes
great cost with little business benefit.
Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the
length of the input (even if input is millions of bytes). Select best answer.
D
Explanation:
SHA stands for Secure Hash Algorithm. This is used to prove data integrity. The same input(s) will
always produce the exact same output. This output is always 256 bits or 32 bytes in length regardless
of the length of the input (even if input is millions of bytes).
In the Ethereum EVM there are two types of memory areas. (Select two.)
A,C
What are some advantages of Proof of Stake(POS) mining over Proof of Work(POW) mining? (Select
three.)
A,C,D
Explanation:
This eliminates the below challenges from PoW and believed to have an advantage.
No need of expensive hardware (a normal laptop or computer running the respective coin’s Validator
client will do as long as your laptop or computer is online)
Energy efficient as it won’t consume high electricity as PoW does More loyal Validators As higher the
stake the Validators have for a long time, more chances for the Validator to be picked up for “forging”
and earn the transaction fee Faster validations
Application Specific Integrated Circuit (ASIC) are used always in enterprise blockchains.
B
Explanation:
ASICS are generally used in blockchains such as BTC that have a Proof of Work consensus due to
competition
What type of encryption is shown below and is commonly used in blockchain cryptography?
B
Explanation:
Asymmetric cryptography utilizes two different keys, a public key and a private to encrypt and
decrypt a particular data. The use of one key cancels out the use of the other.
An encryption algorithm transforms plain text into cipher text using a key?
A