Quantum computers threaten traditional cryptography because they provide polynomial solutions to
mathematically "hard" problems
A
Transactions can be added to DAG-based distributed ledgers without being validated but the same is
not true for blockchain.
A
Which smart contract auditing strategy determines the inputs that will cause different parts of the
code to run?
A
Which of the following is designed to allow someone to prove they know a secret without revealing
it?
C
In which of the following attacks targeting Proof of Stake does an attacker create a divergent chain
and race to make their chain longer than the real chain?
B
Which type of attack misuses Internet protocols to attack the blockchain? Select all that apply.
ABC
Which of the following are common inputs to the algorithm to select the next block creator in Proof
of Stake? Select all that apply
B, C, D
Which algorithm was adopted by Bitcoin's creator for use as a consensus mechanism?
C
Which of the following blockchains has a built-in consensus algorithm?
A
This sample code is vulnerable to which of the following attacks?
A