Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CBSA BTA Certified Blockchain Solution Architect Questions and Answers

Questions 4

To interact with a deployed Ethereum Smart Contract, a user or app must:

Options:

A.

Have a reference to the public address of the deployed Smart Contract

B.

Have the appropriate permissions needed to invoke the functions of the Smart Contract

C.

Have sufficient gas to perform read and write operations against the Smart Contract

D.

All of the above

Buy Now
Questions 5

Consider the following scenario: A solo app developer wants to create their own cryptocurrency and build a blockchain based that allows users to buy and sell second-hand items with that cryptocurrency from each other. Before the transaction is considered complete, the purchaser must put the funds in an escrow service and the sender must enter the courier tracking number into that same escrow. Time is of the essence and this developer doesn’t want to worry about networking of infrastructure. This app must be fully autonomous or “decentralized”.

Which architecture would best solve the product need?

Options:

A.

Ethereum for token creation and escrow service; User-facing features built with web technologies and deployed through IPFS

B.

Ethereum for token creation; Traditional multitier API and database for escrow service; User-facing features built in web technologies then minified unto a String and deployed to an Ethereum Smart Contract

C.

Hyperledger Fabric for the escrow service and token creation using chaincode; User-facing features built with Hyperledger Composer

D.

The product cannot be built. Fully decentralized apps are not yet possible for user interface

Buy Now
Questions 6

Your customer is an enterprise that is focused on financial sectors.

What type of blockchain would this customer likely want specified for their enterprise?

Options:

A.

Permissionless

B.

Decentralized

C.

Hybrid

D.

Permissioned

Buy Now
Questions 7

Chaincode is a decentralized transactional program, running on the validating nodes. As with every chaincode, it implements the ____________________ in particular, Init and Invoke functions.

What does is actually implemented?

Options:

A.

SDK

B.

REST Interface

C.

EVM

D.

Chaincode interface

Buy Now
Questions 8

In Hyperledger there are three distinct types of nodes.

What are the three types of nodes? (Select three.)

1. Client Node: That initiates the transaction

2. Peer Nodes: Commits Transaction & keeps the data in sync across the ledger

3. Ordered: They are the communication backbones and responsible for the distribution of

the transactions.

Options:

A.

Client Node

B.

Ordered Node

C.

Certificate Node

D.

Anchor

E.

Peer Node

Buy Now
Questions 9

Your company working for is now considering the blockchain. They would like to perform a POC with R3 Corda. The CIO was reading about different blockchain consensus algos and would like to understand what type of consensus algos is used with Corda.

What is the best answer?

Options:

A.

R3 Corda is a pluggable blockchain and allows the enterprise flexibility

B.

R3 Corda is a byzantine fault tolerant blokchain

C.

R3 Corda is a proof of stake based blockchain

D.

R3 Corda is a proof of work based blockchain

Buy Now
Questions 10

The Hyperledger Fabric business network is divided into three categories.

What are the three categories? (Select three.)

Options:

A.

Membership

B.

Chaincode

C.

Networking

D.

EVM

E.

Blockchain

Buy Now
Questions 11

Transactions can be only added to a blockchain.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 12

Which of the following enterprise blockchains have a pluggable framework consensus algo? (Select two.)

Options:

A.

Quorum

B.

R3 Corda

C.

Ethereum

D.

Hyperledger Fabric

E.

Ripple

Buy Now
Questions 13

Ethereum is considered to be a ______________type of blockchain.

Options:

A.

Permissionless

B.

Permission Based

C.

Hybrid

D.

Private

Buy Now
Questions 14

Proof of Stake based blockchain systems use what design to permit valid write transactions?

Options:

A.

A genesis “Stake” node approves or disapproves transactions announced from other nodes

B.

Validator nodes each give or pay a stake in order to write transactions, and if malicious, will lose their stake

C.

Stakeholders or early product investors host nodes that approve or disapprove transactions from other nodes

D.

Every node on the network holds an equal stake, and if malicious, gets flagged for removal

Buy Now
Questions 15

To approve pending ledger transactions, consensus algorithms often implement:

Options:

A.

Byzantine Fault Tolerance

B.

Access Control

C.

Kerckhoffs’s Principle

D.

Common Weakness Enumeration

Buy Now
Questions 16

What type of encryption is shown below and is commonly used in blockchain cryptography? 

Options:

A.

Diffie-Hellman

B.

Asymmetric Encryption

C.

Synchronous

D.

Asynchronous

E.

Symmetric Encryption

Buy Now
Questions 17

Which of these reasons is a good reason to choose a conventional database over blockchain to store application data?

Options:

A.

Centralization is to be avoided

B.

Databases should never be used over blockchain

C.

Full history is needed for all data

D.

High performance is required

Buy Now
Questions 18

Which of following scenarios and datasets would be best suited to be utilized by a blockchain solution?

Options:

A.

Scenario: Online game, Dataset: Unique Items In Game, Battles Won, Quests Completed

B.

Scenario: Mobile app for inspirational quotes; Dataset: First Name, Last Name, Quote of the Day

C.

Scenario: Sales (CRM) website; Dataset: Hot Lead Count, Lead Score, Lead Fullname, Today’s Tasks

D.

All of the above

Buy Now
Questions 19

Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

Options:

A.

Neo Generals’ problem

B.

Byzantine Generals’ problem

C.

Byzantine Admirals’ problem

D.

Renaissance Generals’ problem

Buy Now
Questions 20

What component on the blockchain maintains the "world state"?

Options:

A.

.acl

B.

Reputation Manager

C.

Distributed Ledger

D.

.bna

Buy Now
Questions 21

In the Ethereum EVM there are two types of memory areas. (Select two.)

Options:

A.

Storage

B.

Database

C.

Memory

D.

Persistent

E.

Ephemeral

Buy Now
Questions 22

In common blockchain design, identity and transaction approval is possible through:

Options:

A.

AES encryption

B.

Public key cryptography

C.

Secret key cryptography

D.

None of the above

Buy Now
Questions 23

In Hyperledger Fabric chaincode runs in a secured Docker container isolated from the endorsing peer process?

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

In common blockchain design, which data structure is used to create a lightweight digital fingerprint of all the transactions within a block?

Options:

A.

Blockchains are unique in that they utilize no data structures

B.

Lexicographic Search Tree

C.

Bloom Filter

D.

Merkle Tree

Buy Now
Questions 25

What blockchain is considered Blockchain 1.0, the first blockchain?

Options:

A.

Bitcoin Cash

B.

Ethereum

C.

Litecoin

D.

Bitcoin

E.

NEO

Buy Now
Questions 26

What is a logic gate in electronics and computer science?

Options:

A.

A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be both 1 and 0.

B.

A logic gate usually takes in 3 inputs and gives out 2 output. The inputs and outputs are binary values, meaning they can be 1 or 0.

C.

A logic gate usually takes in 2 inputs and gives out 6 output. The inputs and outputs are binary values, meaning they can be both 1 and 0.

D.

A logic gate usually takes in 2 inputs and gives out 1 output. The inputs and outputs are binary values, meaning they can be 1 or 0.

Buy Now
Questions 27

The ____________of the tree is the topmost node and hence this tree is represented upside down. The bottommost nodes are called as ________nodes. Each node is simply a cryptographic hash of a transaction.

In the above diagram, Transaction A,B, C,C from the leaves of the tree. Select one.

Options:

A.

Root, Hash

B.

Root, Leaf Nodes

C.

Has, Root nodes

D.

Leaf nodes, Root

E.

Leaf Nodes, Root

Buy Now
Questions 28

Chaincode Services uses Docker to host (deploy) the chaincode without relying on any virtual machine or computer language.

What would be the main reason or best reason that Hyperledger chose containers over virtual machines?

Options:

A.

Docker provides a secured, lightweight method to sandbox chaincode execution that is not “locked down”.

B.

Docker provides a secured, lightweight method to sandbox chaincode execution that is not “locked down” but additional programming languages cannot be enabled.

C.

Docker provides a secured, lightweight method to sandbox chaincode execution that is “locked down”.

D.

Docker is fully compatible with Hyperledger and Linux with an upgrade subscription.

Buy Now
Questions 29

You have flown to NYC to have a discussion with a technical executive of a too big to fail bank. You are having a discussion about blockchain algos and the customer is asking what are some disadvantages of using a POW algo?

Options:

A.

Centralization of blockchain control

B.

Only use case for computational power is blockchain

C.

Large expenditures for computational power

D.

Not profitable for miners

E.

51% attack mitigation

Buy Now
Questions 30

R3 Corda does not organize time into blocks. What does Corda actually perform and use?

Options:

A.

Ripple is implemented as the blockchain and XRP for cryptocurrency.

B.

Notary services and timesmapping

C.

R3 Corda is a blockchain and does use blocks

D.

Notary services and timestamping

Buy Now
Questions 31

Which factor influences the gas cost to deploy a Smart Contact on the Ethereum blockchain?

Options:

A.

None. Smart Contract deployment has a fixed gas cost

B.

The types of operations written in code within the Smart Contract

C.

The current Ethereum market conditions

D.

The total size of the complied Smart Contract measured in kilobytes

Buy Now
Questions 32

Satoshi Nakamoto invented a way to achieve Decentralized Consensus?

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

A product’s supply chain data is stored on blockchain. Only members of the product supply chain can write announcements to the blockchain but any consumer can query this data in a store to learn more about the product they want to buy. This is an example of a ____/____ blockchain.

Options:

A.

public /closed

B.

private / open

C.

private / closed

D.

public / open

Buy Now
Questions 34

You are currently consulting with an organization that ships widgets overseas. They would like to implement a Hyperledger Fabric and would like to know about how to use cryptocurrencies with Hyperledger Fabric.

What is the best answer?

Options:

A.

If they need a native currency for their chain network, they can develop their own native currency with chaincode.

B.

Hyperledger Fabric can be integrated with any crypto currency by using the proper APIs.

C.

If they need a native currency for their chain network, they must use Ripple currency with chaincode.

D.

If they need a native currency for their chain network, they must use Ethereum currency with chaincode.

E.

Hyperledger Fabric does not support cryptocurrencies.

Buy Now
Exam Code: CBSA
Exam Name: BTA Certified Blockchain Solution Architect
Last Update: Dec 4, 2024
Questions: 229
CBSA pdf

CBSA PDF

$29.75  $84.99
CBSA Engine

CBSA Testing Engine

$35  $99.99
CBSA PDF + Engine

CBSA PDF + Testing Engine

$47.25  $134.99