11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CBSA Exam Dumps - BTA Certified Blockchain Solution Architect

Question # 4

Consider the following scenario: A solo app developer wants to create their own cryptocurrency and build a blockchain based that allows users to buy and sell second-hand items with that cryptocurrency from each other. Before the transaction is considered complete, the purchaser must put the funds in an escrow service and the sender must enter the courier tracking number into that same escrow. Time is of the essence and this developer doesn’t want to worry about networking of infrastructure. This app must be fully autonomous or “decentralized”.

Which architecture would best solve the product need?

A.

Ethereum for token creation and escrow service; User-facing features built with web technologies and deployed through IPFS

B.

Ethereum for token creation; Traditional multitier API and database for escrow service; User-facing features built in web technologies then minified unto a String and deployed to an Ethereum Smart Contract

C.

Hyperledger Fabric for the escrow service and token creation using chaincode; User-facing features built with Hyperledger Composer

D.

The product cannot be built. Fully decentralized apps are not yet possible for user interface

Full Access
Question # 5

What is diagram referencing below?

A.

AND Gate

B.

XOR Gate

C.

OXR Gate

D.

NAND Gate

Full Access
Question # 6

Blockchains are decentralized ledgers which, by definition, are not controlled by a central authority. Due to the value stored in these ledgers, bad actors have huge economic incentives to try and cause faults.

What algo was the original solution to the potential problem as specified by Satoshi?

A.

Proof of Stake

B.

Byzantine Fault Tolerance

C.

Proof of Burn

D.

Proof of Work

E.

Dynamic Proof of Stake

Full Access
Question # 7

You currently on a conference call with an executive from a too big to fail bank. They are validating that they want to use Quorum or another enterprise blockchain. They specifically want to know what type of consensus algo it uses and what industry for the Quorum blockchain targets.

A.

BFT, cross industry

B.

POS, Financial only

C.

Majority voting, Financial only

D.

Majority voting, cross industry

E.

POW, cross industry

Full Access
Question # 8

The fabric framework is implemented on ______programming language.

What programming language?

A.

Go

B.

Python

C.

Node.js

D.

Java

E.

JS

Full Access
Question # 9

What type of "bug" generally occurs when something isn’t right according to business requirements?

A.

Business logic

B.

Business Requirements

C.

Integration

D.

Accessibility

E.

Security

Full Access
Question # 10

Application Specific Integrated Circuit (ASIC) are used always in enterprise blockchains.

A.

TRUE

B.

FALSE

Full Access
Question # 11

Which one of the following is a consideration that must be taken into account when using Hyperledger Fabric that you wouldn’t need worry about on Ethereum?

A.

The fees for deploying and using Smart Contracts

B.

How you will provide proper uptime for the network

C.

The level of security of Smart Contracts (chaincode)

D.

How often hard forks occurs on the software

Full Access
Question # 12

When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)

A.

Block Ciphers

B.

Rivest-Shamir-Adleman algorithm aka the RSA.

C.

Stream Ciphers

D.

Elliptical Curve Cryptography

Full Access
Question # 13

In regards to understanding the Ethereum Virtual Machine what statement is true?

A.

The EVM is extremely powerful, non-turing complete and perfect for doing computational intensive thins, because of the direct access to the graphics card.

B.

The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.

C.

While the EVM is Sandboxed, it isn’t as powerful as the Bitcoin network, because it’s not Turing Complete

D.

The EVM can’t access hardware layers or anything outside a blockchain node because it’s sandboxed.

Full Access
Question # 14

Public blockchains can alter the blockchain ledger by:

A.

Creating a hard fork of the blockchain data, tooling and/or software

B.

Achieving community consensus via a Smart Contract to update the ledger

C.

Re-hashing the blocks from the total block height down to the genesis block

D.

Blockchain ledgers are immutable and can never be altered

Full Access
Question # 15

When you are developing with Fabric Composer which of the following is true?

A.

Decreases the time of development

B.

Simplifies the development of applications

C.

Simplifies the integration of client applications

D.

Increases the time of development

Full Access
Question # 16

How are "assets" in Hyperledger Fabric represented? (Select two.)

A.

JSON

B.

Node

C.

YAML

D.

Binary

E.

Deployment Manager

Full Access
Question # 17

Adding more nodes to a blockchain network has which effect?

A.

Increased centralization

B.

Increased security

C.

Decreased costs

D.

Increased performance

Full Access
Question # 18

In Hyperledger Fabric, the smart contract logic is also called by two other names _______________ and ______________? (Select two.)

A.

CordApps

B.

DApps

C.

Programmatic Logic

D.

Ripple

E.

Chaincode

F.

Ledger

Full Access
Question # 19

If a Proof of Work blockchain such a s Bitcoin or Ethereum changed to a Proof of Stake consensus paradigm, which key component of the Proof of Work process would be eliminated?

A.

There would be no need for the miners or nodes to perform a guessing game

B.

The need to solve Byzantine Fault Tolerance

C.

All fees related to transactions would be removed

D.

The blockchain network would no longer have to display public transactions

Full Access
Question # 20

You are using Geth and you would like to list the accounts controlled by the node.

What is the command?

A.

geth list accounts

B.

geth account node list

C.

geth account node

D.

geth account list

Full Access
Question # 21

Smart Contracts are generally written in specific programming languages. Which one is NOT a language for smart contracts?

A.

.Net

B.

Viper

C.

LLL

D.

Solidity

Full Access
Question # 22

Which of the following hashing algos is considered to be the strongest?

A.

RSA

B.

SHA-2

C.

AES

D.

MD-5

E.

SHA

Full Access
Question # 23

What are two cryptocurrencies that you would expect to see mining equipment with ASICS? (Select two.)

A.

Bitcoin

B.

Ethereum

C.

Neo

D.

Litecoin

E.

Monero

Full Access
Question # 24

The first actual known blockchain software implementation and deployment occurred:

A.

In 1991 by Stuart Haber

B.

In 2011 Markus Persson

C.

In 2009 by Satoshi Nakamoto

D.

In 1991 by Linus Torvalds

Full Access
Question # 25

Transactions can only be added to a blockchain.

A.

TRUE

B.

FALSE

Full Access
Question # 26

How many peers in the network need to endorse a transaction in a Hyperledger Fabric blockchain?

A.

The number of peers required to endorse a transaction is driven by the IAM policy that is specified by the ledger.

B.

The number of peers required to endorse a transaction is driven by the endorsement policy that is specified by the DApps.

C.

The number of peers required to endorse a transaction is driven by the endorsement policy that is specified by the ledger.

D.

The number of peers required to endorse a transaction is driven by the endorsement policy that is specified at chaincode deployment time.

Full Access
Question # 27

Proof of Stake consensus is most often needed for and implemented by:

A.

Blockchain networks with low traffic

B.

Permissioned blockchains

C.

Blockchains that manage wealth and assets

D.

Public blockchains

Full Access
Question # 28

The “Nothing-at-Stake” problem that could be realized by Proof of Stake networks would be caused by what?

A.

If all of the validator nodes are taken offline

B.

If validator nodes reject all transactions

C.

Validator nodes approving all transactions on old and new software after a hard fork occurs

D.

All of the above

Full Access
Question # 29

By design, permissioned blockchains such as Hyperledger Fabric are not capable of creating or utilizing cryptocurrency.

A.

FALSE

B.

TRUE

Full Access
Question # 30

What is provided by the Hyperledger Fabric to facilitate network communications?

A.

API

B.

SDK

C.

Ruby

D.

Middleware

Full Access
Question # 31

Which of the following would create a blockchain transaction?

A.

Updating a Smart Contract

B.

Updating an internal State variable

C.

Exchanging solution tokens

D.

All of the above

Full Access
Question # 32

___________is advantageous because it presents scalability and low cost transactions, but like DPoS introduces a component of centralization.

What algorithm is being referenced here?

A.

Byzantine Fault Tolerance

B.

Hashgraph

C.

Proof of Stake

D.

Proof of Work

E.

DAG

Full Access
Question # 33

When a consensus algo is considered to be "pluggable modularity», what does that mean?

A.

Add permission as needed

B.

Add user as needed

C.

Select an optimal algorithm for your networks

D.

Select a specific API that manages the blockchain

Full Access
Question # 34

A Smart Contract needs to check the daily closing price of a stock, in order to determine how to act. The proper way to do this is with the use of ______________.

A.

Oracles

B.

Wizards

C.

Data rabbits

D.

All of the above

Full Access