1What is a major disadvantage of a centralized ledger system?
Need for distributed record keeping
Easy
A.It requires all participants to be anonymous.
B.It is too transparent.
C.It has a single point of failure.
D.It is very slow to update.
Correct Answer: It has a single point of failure.
Explanation:
In a centralized system, if the central server or authority fails, the entire system can go down. This makes it a single point of failure, a problem that distributed systems aim to solve.
Incorrect! Try again.
2A hash pointer is a data structure that contains a pointer to some data along with what else?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Easy
A.The timestamp of the data.
B.A digital signature of the data.
C.The public key of the data's creator.
D.A cryptographic hash of the data.
Correct Answer: A cryptographic hash of the data.
Explanation:
A hash pointer consists of two parts: a pointer to where the data is stored and a cryptographic hash of that data. This allows for the creation of verifiable, tamper-evident data structures like blockchains.
Incorrect! Try again.
3The Byzantine Generals Problem is an analogy for describing the challenge of...
Byzantine generals problem
Easy
A.storing large amounts of data efficiently.
B.encrypting messages between two parties.
C.achieving consensus in a distributed system with potentially malicious actors.
D.recovering data after a server crash.
Correct Answer: achieving consensus in a distributed system with potentially malicious actors.
Explanation:
This classic problem illustrates the difficulty of having multiple parties agree on a single truth when some of those parties might be unreliable or actively trying to sabotage the process.
Incorrect! Try again.
4What key problem in electronic cash systems did Satoshi Nakamoto's Bitcoin proposal solve using blockchain?
Nakamoto’s concept with Blockchain based cryptocurrency
Easy
A.The issue of slow international payments.
B.The need for user anonymity.
C.The problem of high transaction fees.
D.The double-spending problem.
Correct Answer: The double-spending problem.
Explanation:
The double-spending problem is the risk that a digital currency can be spent more than once. Nakamoto's innovation was creating a decentralized, timestamped ledger (the blockchain) to publicly verify that a transaction has occurred, preventing the same digital coin from being used again.
Incorrect! Try again.
5What is the primary purpose of a consensus algorithm in a blockchain network?
Consensus algorithms and their scalability problems
Easy
A.To ensure all nodes in the network agree on the state of the ledger.
B.To create new cryptocurrencies.
C.To encrypt all transactions for privacy.
D.To reduce the size of the blockchain.
Correct Answer: To ensure all nodes in the network agree on the state of the ledger.
Explanation:
A consensus algorithm is a process used to achieve agreement on a single data value among distributed processes or systems. In blockchain, it ensures every participant has an identical and valid copy of the ledger.
Incorrect! Try again.
6In the context of distributed systems, what is a 'Byzantine fault'?
Modeling faults and adversaries
Easy
A.A node that simply stops working or crashes.
B.A temporary network connection issue.
C.A node behaving maliciously or in any arbitrary, unpredictable way.
D.An error in the software's code.
Correct Answer: A node behaving maliciously or in any arbitrary, unpredictable way.
Explanation:
A Byzantine fault is the most severe type of fault, where a component can behave erratically. It could send conflicting information to different parts of the system, which is much harder to handle than a simple crash fault.
Incorrect! Try again.
7How do hash pointers contribute to the immutability of a blockchain?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Easy
A.By encrypting the data within each block.
B.By creating a chain where changing a previous block would invalidate all subsequent blocks.
C.By ensuring only authorized users can add new blocks.
D.By compressing the data to save space.
Correct Answer: By creating a chain where changing a previous block would invalidate all subsequent blocks.
Explanation:
Each block contains a hash of the previous block. If an attacker alters data in a block, its hash changes. This change would cause a mismatch with the hash pointer in the next block, breaking the chain and making the tampering obvious.
Incorrect! Try again.
8A key benefit of a distributed ledger is that it removes the need for...
Need for distributed record keeping
Easy
A.a trusted central intermediary.
B.data storage.
C.computer hardware.
D.an internet connection.
Correct Answer: a trusted central intermediary.
Explanation:
Distributed ledgers allow participants to transact directly with each other in a verifiable way without needing a traditional intermediary like a bank or government to validate and record the transactions.
Incorrect! Try again.
9What does 'Byzantine Fault Tolerance' (BFT) mean for a system?
Technologies Borrowed in Blockchain – byzantine fault-tolerant distributed computing, digital cash etc.
Easy
A.The system relies on a central authority to resolve disputes.
B.The system can continue to operate correctly even if some nodes are malicious.
C.The system is completely immune to all types of attacks.
D.The system can only handle simple crash faults.
Correct Answer: The system can continue to operate correctly even if some nodes are malicious.
Explanation:
Byzantine Fault Tolerance is a property of a system that allows it to resist the class of failures known as Byzantine faults, where components may fail and there is imperfect information about whether a component has failed.
Incorrect! Try again.
10A common scalability problem for many consensus algorithms is that they can have low...
Consensus algorithms and their scalability problems
Easy
A.data storage.
B.security.
C.decentralization.
D.transaction throughput.
Correct Answer: transaction throughput.
Explanation:
Scalability is a major challenge. Many robust consensus mechanisms, like Bitcoin's Proof of Work, can only process a small number of transactions per second (low throughput), which limits their use for high-volume applications.
Incorrect! Try again.
11The first block in any blockchain is commonly referred to as the...
Nakamoto’s concept with Blockchain based cryptocurrency
Easy
A.Alpha Block.
B.Source Block.
C.Root Block.
D.Genesis Block.
Correct Answer: Genesis Block.
Explanation:
The Genesis Block is the very first block of a blockchain, serving as the foundation upon which all subsequent blocks are built. It is the only block in the chain that does not have a preceding block.
Incorrect! Try again.
12A server in a network that completely stops responding is an example of a...
Modeling faults and adversaries
Easy
A.Timing fault.
B.Crash fault.
C.Security fault.
D.Byzantine fault.
Correct Answer: Crash fault.
Explanation:
A crash fault, or fail-stop fault, is a simple type of failure where a component stops operating entirely. This is less complex to handle than a Byzantine fault, where a component might continue to operate but in an incorrect or malicious way.
Incorrect! Try again.
13In the Byzantine Generals Problem, what is the consequence if the generals fail to reach a consensus?
Byzantine generals problem
Easy
A.The messages get encrypted and cannot be read.
B.One general becomes the supreme commander.
C.Their coordinated attack or retreat fails, leading to defeat.
D.The war ends in a peaceful truce.
Correct Answer: Their coordinated attack or retreat fails, leading to defeat.
Explanation:
The core of the problem is that a lack of agreement leads to a catastrophic failure. If some generals attack while others retreat, they are easily defeated. This highlights the critical importance of achieving consensus.
Incorrect! Try again.
14Which of the following is a well-known example of a consensus algorithm used in blockchain?
Technologies Borrowed in Blockchain – consensus
Easy
A.Secure Hash Algorithm (SHA).
B.Proof of Work (PoW).
C.Hypertext Transfer Protocol (HTTP).
D.Advanced Encryption Standard (AES).
Correct Answer: Proof of Work (PoW).
Explanation:
Proof of Work is the consensus mechanism pioneered by Bitcoin. AES and SHA are cryptographic primitives (for encryption and hashing, respectively), and HTTP is a communication protocol, not a consensus algorithm.
Incorrect! Try again.
15What does 'immutability' mean in the context of a blockchain ledger?
Need for distributed record keeping
Easy
A.The ledger is completely anonymous.
B.The ledger is stored in a single, secure location.
C.Anyone can write data to the ledger without permission.
D.Once data is recorded, it cannot be altered or deleted.
Correct Answer: Once data is recorded, it cannot be altered or deleted.
Explanation:
Immutability is a key feature of blockchain, meaning that transactions recorded on the ledger are permanent and cannot be changed. This is primarily achieved through cryptographic hashing and the chain-like structure.
Incorrect! Try again.
16The identity of Satoshi Nakamoto, the creator of Bitcoin, is...
Nakamoto’s concept with Blockchain based cryptocurrency
Easy
A.a pseudonym and remains unknown.
B.the CEO of a major Japanese technology company.
C.a well-known computer scientist named Hal Finney.
D.known to be a team of developers at Google.
Correct Answer: a pseudonym and remains unknown.
Explanation:
Satoshi Nakamoto is the name used by the presumed pseudonymous person or persons who developed Bitcoin. Their true identity has never been confirmed.
Incorrect! Try again.
17The concept of 'digital cash' existed before blockchain. What was its main weakness that blockchain addressed?
Technologies Borrowed in Blockchain – digital cash etc.
Easy
A.It was not based on cryptography.
B.It relied on a central authority to prevent double-spending.
C.It was too slow for practical use.
D.It could not be transferred over the internet.
Correct Answer: It relied on a central authority to prevent double-spending.
Explanation:
Early digital cash systems required a trusted third party (like a bank) to keep a central ledger and ensure that users did not spend the same money twice. Blockchain provided a way to solve this problem in a decentralized manner.
Incorrect! Try again.
18In a blockchain, what is a 'block'?
Consensus algorithms and their scalability problems
Easy
A.A collection of transactions that are bundled together and added to the chain.
B.A single transaction between two users.
C.The cryptographic key used for signing.
D.A user's digital wallet.
Correct Answer: A collection of transactions that are bundled together and added to the chain.
Explanation:
A block is a data structure that contains a batch of transactions, a timestamp, and a hash pointer to the previous block. Blocks are linked together to form the 'chain'.
Incorrect! Try again.
19What fundamental technology is used to create the 'hash' in a hash pointer?
Technologies Borrowed in Blockchain – byzantine fault-tolerant distributed computing, digital cash etc.
Easy
A.A digital signature algorithm.
B.Public key encryption.
C.A cryptographic hash function.
D.A random number generator.
Correct Answer: A cryptographic hash function.
Explanation:
A cryptographic hash function (like SHA-256) is a mathematical algorithm that takes an input of any size and produces a fixed-size string of characters, which is the 'hash'. This is the core component that makes the chain tamper-evident.
Incorrect! Try again.
20What does it mean for a network to reach 'consensus'?
Consensus algorithms and their scalability problems
Easy
A.A majority of nodes agree on the same state.
B.Every node is online at the same time.
C.The network administrator approves a transaction.
D.A transaction has been encrypted.
Correct Answer: A majority of nodes agree on the same state.
Explanation:
Consensus is the process of achieving agreement among a group of distributed participants. In blockchain, this agreement pertains to the validity and order of transactions, ensuring a single, shared truth across the network.
Incorrect! Try again.
21A government wants to create a new land registry system to prevent fraudulent changes to property records. A traditional centralized database with backups is proposed, as is a blockchain-based distributed ledger. What is the primary advantage of the distributed ledger in this specific scenario?
Need for distributed record keeping
Medium
A.It creates a tamper-evident and censorship-resistant record without relying on a single trusted administrator.
B.It is inherently immune to fraudulent entries by authorized officials.
C.It offers higher transaction processing speed than a centralized database.
D.It is less expensive to set up and maintain than a centralized server with backups.
Correct Answer: It creates a tamper-evident and censorship-resistant record without relying on a single trusted administrator.
Explanation:
The core value of a distributed ledger here is not speed or initial cost, but its trust model. By distributing the record and making it cryptographically immutable, it prevents a single entity (even a corrupt administrator in the central authority) from altering historical records without detection. While authorized officials could still submit fraudulent new entries, changing past records becomes extremely difficult.
Incorrect! Try again.
22In a system with 10 generals attempting to reach consensus, what is the maximum number of traitorous (Byzantine) generals that can be tolerated for the loyal generals to still reach a correct decision, assuming they use a traditional Byzantine fault-tolerant algorithm?
Byzantine generals problem
Medium
A.5
B.4
C.3
D.2
Correct Answer: 3
Explanation:
The classic solution to the Byzantine Generals Problem states that consensus can be achieved if the number of traitors () is less than one-third of the total number of generals (). The formula is . In this case, . If , then . Since , the system can tolerate up to 3 traitors. If there were 4 traitors, , and , so consensus would not be guaranteed.
Incorrect! Try again.
23How does Nakamoto's consensus mechanism (Proof-of-Work) address the double-spending problem in a decentralized network without a central authority?
Nakamoto’s concept with Blockchain based cryptocurrency
Medium
A.By making it computationally expensive to rewrite history, and incentivizing nodes to extend the longest, valid chain.
B.By encrypting all transactions so they cannot be duplicated.
C.By requiring every user to have a unique, verified digital identity.
D.By processing transactions in a strict first-in-first-out queue across the entire network.
Correct Answer: By making it computationally expensive to rewrite history, and incentivizing nodes to extend the longest, valid chain.
Explanation:
Nakamoto's solution makes creating a block computationally difficult (mining). To double-spend, an attacker must create a fraudulent transaction and then build a longer chain containing it faster than the rest of the honest network. This requires immense computational power (a 51% attack). The economic incentives (block rewards and transaction fees) encourage miners to work on the valid, longest chain, making such an attack prohibitively expensive and unlikely.
Incorrect! Try again.
24What is the specific function of a 'hash pointer' in the structure of a blockchain?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Medium
A.It creates a tamper-evident link to the previous block by containing its cryptographic hash.
B.It encrypts the data within a block to ensure confidentiality.
C.It provides a timestamp for when the block was created.
D.It points to the physical memory location of the previous block on a disk.
Correct Answer: It creates a tamper-evident link to the previous block by containing its cryptographic hash.
Explanation:
A hash pointer is a data structure that contains both a pointer to the location of the previous block and the cryptographic hash of that block's data. By including the hash of Block N-1 inside Block N, it creates a chain. If any data in Block N-1 is altered, its hash will change, breaking the link from Block N and all subsequent blocks, thus making tampering immediately evident.
Incorrect! Try again.
25A blockchain network is described as facing the 'Blockchain Trilemma'. It is highly decentralized with thousands of nodes worldwide and has proven to be extremely secure against attacks. Based on the trilemma, which characteristic is most likely compromised?
Consensus algorithms and their scalability problems
Medium
A.Immutability
B.Scalability
C.Security
D.Decentralization
Correct Answer: Scalability
Explanation:
The Blockchain Trilemma, as proposed by Vitalik Buterin, posits that it is difficult for a blockchain to simultaneously achieve high levels of decentralization, security, and scalability. If a network is highly decentralized (many nodes must validate every transaction) and highly secure (requiring significant work or stake), its ability to process a large number of transactions per second (scalability) is typically the trade-off. For example, Bitcoin prioritizes security and decentralization, resulting in low transaction throughput.
Incorrect! Try again.
26In a permissionless blockchain network, an adversary creates thousands of fake identities (nodes) to gain a disproportionately large influence on the network's consensus or governance. What is this type of attack called?
Modeling faults and adversaries
Medium
A.An Eclipse Attack
B.A Sybil Attack
C.A Denial-of-Service (DoS) Attack
D.A 51% Attack
Correct Answer: A Sybil Attack
Explanation:
A Sybil attack is characterized by an adversary creating a large number of pseudonymous identities to subvert a reputation system. In a blockchain context, this means creating many nodes or accounts to manipulate consensus, censor transactions, or disrupt the network. Proof-of-Work and Proof-of-Stake are mechanisms designed to mitigate Sybil attacks by making influence proportional to a scarce resource (computational power or staked capital) rather than the number of identities.
Incorrect! Try again.
27How did the introduction of digital signatures (signed messages) change the requirements for solving the Byzantine Generals Problem compared to the original oral message scenario?
Byzantine generals problem
Medium
A.It completely eliminates the possibility of traitorous behavior.
B.It allows consensus with a higher proportion of traitors ().
C.It allows loyal generals to prove the origin of a message, preventing traitors from forging orders.
D.It removes the need for generals to communicate with each other.
Correct Answer: It allows loyal generals to prove the origin of a message, preventing traitors from forging orders.
Explanation:
In the oral message version, a traitorous lieutenant can lie to one general about the commander's order and lie differently to another. With signed messages, the commander signs the order with their private key. A traitor can choose to not forward the message, but they cannot alter it or forge a new one, as they do not possess the commander's private key. This allows loyal generals to verify the authenticity of orders and detect forgery, making consensus easier to achieve.
Incorrect! Try again.
28Why is a transaction in Bitcoin considered to have 'probabilistic finality' rather than 'deterministic finality'?
Nakamoto’s concept with Blockchain based cryptocurrency
Medium
A.Because there is a small chance the cryptographic hash function can be broken.
B.Because network latency can cause nodes to see the transaction at different times.
C.Because a longer, competing chain could emerge that orphans the block containing the transaction.
D.Because the transaction might be rolled back by a central administrator.
Correct Answer: Because a longer, competing chain could emerge that orphans the block containing the transaction.
Explanation:
In Nakamoto consensus, the 'correct' chain is the longest valid chain. It is always theoretically possible, although increasingly improbable over time, for an attacker or a network partition to create a new chain that becomes longer than the current one. This would 'orphan' the blocks on the shorter chain, effectively reversing the transactions within them. The more blocks that are built on top of a transaction (confirmations), the more computationally difficult this becomes, so the probability of reversal approaches zero, but it is never absolutely zero. This is 'probabilistic finality'.
Incorrect! Try again.
29A consortium of competing banks wants to create a shared ledger for inter-bank settlements. Why would a distributed ledger be more suitable than having one of the banks host a central database for all of them?
Need for distributed record keeping
Medium
A.The central database would be technically incapable of handling the transaction volume.
B.Distributed ledgers are legally recognized as superior for financial settlements in all jurisdictions.
C.A distributed ledger removes the need for any single bank to be the trusted intermediary, fostering equality and reducing counterparty risk.
D.The other banks would be unable to audit the central database hosted by the single bank.
Correct Answer: A distributed ledger removes the need for any single bank to be the trusted intermediary, fostering equality and reducing counterparty risk.
Explanation:
In a consortium of competitors, trust is a major issue. If one bank controls the central ledger, it has an unfair advantage and becomes a single point of failure and control. A distributed ledger allows all participating banks to have a copy of the same data and validate transactions collectively. This removes the need to trust a single, powerful intermediary and creates a more equitable system for all participants.
Incorrect! Try again.
30A proof-of-stake (PoS) blockchain is often considered more energy-efficient than a proof-of-work (PoW) blockchain. How does this characteristic relate to scalability?
Consensus algorithms and their scalability problems
Medium
A.PoS systems use less energy because they process transactions one by one, which limits scalability.
B.It has no relationship to scalability; it is purely an environmental benefit.
C.Energy efficiency directly increases the number of transactions per second.
D.It lowers the barrier to entry for becoming a validator, potentially increasing the number of participants and aiding decentralization without massive energy costs.
Correct Answer: It lowers the barrier to entry for becoming a validator, potentially increasing the number of participants and aiding decentralization without massive energy costs.
Explanation:
Scalability isn't just about transactions per second (TPS). It's also about the ability of the network to grow and be maintained sustainably. In PoW, securing the network requires vast amounts of electricity and specialized hardware, creating a high barrier to entry. PoS lowers this barrier to the cost of the staked cryptocurrency and regular hardware. This can allow for more validators to participate, which is a component of a scalable and decentralized system, without the accompanying environmental and hardware scaling problems of PoW.
Incorrect! Try again.
31Consider a distributed system where nodes can either crash and stop communicating entirely (a fail-stop fault) or continue operating but send deliberately incorrect and conflicting information (a Byzantine fault). Why is designing a consensus protocol for the Byzantine fault scenario significantly more complex?
Modeling faults and adversaries
Medium
A.Because fail-stop faults are rare in real-world systems.
B.Because Byzantine faults require cryptographic signatures, which are computationally slow.
C.Because loyal nodes must distinguish between correct, malicious, and absent information, whereas in a fail-stop model, they only need to handle absent information.
D.Because crashed nodes can be easily rebooted, while malicious nodes cannot.
Correct Answer: Because loyal nodes must distinguish between correct, malicious, and absent information, whereas in a fail-stop model, they only need to handle absent information.
Explanation:
In a fail-stop model, a node's silence is an unambiguous signal that it has failed. The remaining nodes can simply proceed without it. In a Byzantine model, a malicious node is active and deceptive. It can send a 'commit' message to one node and an 'abort' message to another, actively trying to sow discord and prevent consensus. This requires complex algorithms for loyal nodes to compare messages from multiple sources to identify and ignore the malicious actor.
Incorrect! Try again.
32How does the finality provided by a Practical Byzantine Fault Tolerance (pBFT) consensus algorithm differ from the finality in Nakamoto's Proof-of-Work consensus?
Technologies Borrowed in Blockchain – byzantine fault-tolerant distributed computing
Medium
A.Both provide deterministic finality, but pBFT is faster.
B.pBFT provides probabilistic finality, while PoW provides deterministic finality.
C.pBFT provides deterministic finality after a round of voting, while PoW provides probabilistic finality that strengthens over time.
D.pBFT provides no finality, while PoW provides probabilistic finality.
Correct Answer: pBFT provides deterministic finality after a round of voting, while PoW provides probabilistic finality that strengthens over time.
Explanation:
pBFT is designed for permissioned networks where the set of validators is known. Once a supermajority (e.g., 2/3+1) of validators agree on a block, it is considered final and cannot be reverted (deterministic finality). Nakamoto consensus, used in permissionless networks like Bitcoin, relies on the 'longest chain' rule. A block is never 100% final because a longer chain could theoretically emerge and replace it. Its finality is probabilistic and increases with each subsequent block (confirmation).
Incorrect! Try again.
33What is the primary function of the Unspent Transaction Output (UTXO) model used in Bitcoin, as compared to a traditional account/balance model?
Nakamoto’s concept with Blockchain based cryptocurrency
Medium
A.To link every transaction directly to a user's real-world identity.
B.To simplify the process of calculating transaction fees for miners.
C.To ensure every user's total balance is publicly visible on the ledger.
D.To track individual 'coins' or chunks of cryptocurrency, which are consumed as inputs and created as outputs in transactions.
Correct Answer: To track individual 'coins' or chunks of cryptocurrency, which are consumed as inputs and created as outputs in transactions.
Explanation:
Instead of debiting and crediting accounts, the UTXO model works like digital cash. Each transaction consumes existing UTXOs as inputs and creates new UTXOs as outputs. A user's 'balance' is the sum of all UTXOs they control. This model enhances privacy (as users can use different addresses for each UTXO) and allows for easier parallel verification of transactions, as two transactions spending different UTXOs are independent of each other.
Incorrect! Try again.
34A blockchain network is attempting to improve its scalability by implementing 'sharding'. What is the fundamental principle behind sharding?
Consensus algorithms and their scalability problems
Medium
A.Decreasing the block time to produce blocks more frequently.
B.Using a more powerful central server to process all transactions before they are added to the chain.
C.Increasing the block size limit to fit more transactions in each block.
D.Splitting the network's transaction load and state into smaller, parallel chains (shards) that are processed independently.
Correct Answer: Splitting the network's transaction load and state into smaller, parallel chains (shards) that are processed independently.
Explanation:
Sharding is a scalability technique that partitions the blockchain's state and transaction processing load across multiple smaller groups of nodes, called 'shards'. Instead of every node processing every single transaction (as in a monolithic blockchain like Bitcoin), each shard processes only a subset of transactions. This allows for parallel processing, significantly increasing the network's overall throughput.
Incorrect! Try again.
35What core assumption about the network does a 51% attack on a Proof-of-Work blockchain challenge?
Modeling faults and adversaries
Medium
A.That cryptographic hash functions are unbreakable.
B.That all nodes in the network have low-latency connections.
C.That the majority of the network's computational power is controlled by honest participants.
D.That the private keys of users cannot be stolen.
Correct Answer: That the majority of the network's computational power is controlled by honest participants.
Explanation:
The security of Nakamoto consensus rests on the assumption that honest miners control the majority of the hash rate. A 51% attack occurs when a single entity or colluding group controls more than 50% of the network's mining power. This gives them the ability to consistently mine blocks faster than the rest of the network, allowing them to rewrite parts of the blockchain, prevent transaction confirmations, and double-spend coins.
Incorrect! Try again.
36Early centralized digital cash systems like DigiCash provided strong privacy but had a significant drawback that blockchain solved. What was this key vulnerability?
Technologies Borrowed in Blockchain – digital cash etc.
Medium
A.They could not prevent users from making copies of their digital money.
B.They relied on a central operator, which was a single point of failure and control.
C.They used outdated and insecure encryption methods.
D.They were unable to process micropayments efficiently.
Correct Answer: They relied on a central operator, which was a single point of failure and control.
Explanation:
Systems like DigiCash, while innovative in their use of blind signatures for privacy, were centralized. The entire system depended on a central bank or operator to issue currency and validate transactions. This central entity could fail, be censored by a government, or act maliciously. Blockchain's key innovation was achieving decentralized control, removing the need for this trusted central party to prevent double-spending.
Incorrect! Try again.
37In the context of blockchain, how does Proof-of-Work (PoW) act as a practical, probabilistic solution to the Byzantine Generals Problem in a permissionless setting?
Byzantine generals problem
Medium
A.It requires all nodes to digitally sign their votes, guaranteeing consensus.
B.It makes proposing a version of the 'truth' (a block) computationally expensive, and uses the longest chain as the consensus, effectively letting 'work' be the deciding vote.
C.It identifies and ejects all Byzantine nodes from the network.
D.It creates a hierarchy of nodes where only 'general' nodes can propose blocks.
Correct Answer: It makes proposing a version of the 'truth' (a block) computationally expensive, and uses the longest chain as the consensus, effectively letting 'work' be the deciding vote.
Explanation:
The BGP assumes a known, fixed number of generals. In a permissionless network like Bitcoin, nodes can join and leave freely. PoW solves this by not counting votes from identities (which are vulnerable to Sybil attacks), but by counting votes from computational power. Proposing a block requires significant work. The rest of the network accepts the version of history that has the most work invested in it (the longest chain). A Byzantine actor would need to out-work the entire honest network to impose their version of the truth.
Incorrect! Try again.
38A blockchain has a block size of 2 MB and a block time of 10 minutes. The average transaction size is 500 bytes. Which of the following changes would most directly increase the network's transactions per second (TPS)?
Consensus algorithms and their scalability problems
Medium
A.Increasing the number of miners on the network.
B.Decreasing the block time to 5 minutes while keeping the block size at 2 MB.
C.Decreasing the block reward for miners.
D.Increasing the mining difficulty to make the network more secure.
Correct Answer: Decreasing the block time to 5 minutes while keeping the block size at 2 MB.
Explanation:
Throughput (TPS) is fundamentally a function of how much data can be processed in a given time.
By decreasing the block time to 5 minutes (300 seconds), the new TPS = 4000 transactions / 300 seconds ≈ 13.33 TPS.
This change directly doubles the rate at which blocks (and thus transactions) are processed. The other options do not directly affect the calculation of TPS.
Incorrect! Try again.
39When comparing a replicated database in a traditional client-server architecture with a blockchain, both provide data redundancy. What critical capability does the blockchain offer that a simple replicated database does not?
Need for distributed record keeping
Medium
A.The ability to store large amounts of data.
B.Consensus on the state of the record among parties that do not trust each other.
C.Guaranteed 100% uptime and availability.
D.Faster data retrieval and query performance.
Correct Answer: Consensus on the state of the record among parties that do not trust each other.
Explanation:
A replicated database is typically controlled by a single administrator. All replicas trust the master copy and are just backups. If the administrator is malicious, they can alter the master copy, and this incorrect data will be replicated. A blockchain is designed for adversarial environments where participants do not trust each other. It uses a consensus algorithm to ensure all participants agree on the validity and order of transactions, creating a single, trusted version of the truth without a central coordinator.
Incorrect! Try again.
40In Bitcoin's design, what is the economic purpose of transaction fees, especially in the long term?
Nakamoto’s concept with Blockchain based cryptocurrency
Medium
A.To create a secondary market for users to trade their unspent transaction outputs.
B.To serve as the primary incentive for miners to secure the network after the block reward subsidy eventually diminishes to zero.
C.To punish users who send too many spam transactions.
D.To pay for the network's electricity consumption directly.
Correct Answer: To serve as the primary incentive for miners to secure the network after the block reward subsidy eventually diminishes to zero.
Explanation:
The Bitcoin protocol includes a fixed supply of 21 million coins. The block reward, a subsidy of new coins given to the winning miner of a block, halves approximately every four years. As this subsidy decreases, the security of the network must be maintained by another incentive. Transaction fees, paid by users to have their transactions included in a block, are designed to take over this role, ensuring that miners are still economically motivated to expend computational power to validate transactions and secure the network in the long run.
Incorrect! Try again.
41The famous impossibility result for the Byzantine Generals Problem states that no solution with oral (unauthenticated) messages can tolerate f traitors if the total number of generals n is less than or equal to 3f. Which scenario best explains the fundamental breakdown when n = 3 and f = 1?
Byzantine generals problem
Hard
A.A loyal lieutenant receives conflicting reports about the commander's order from the other general and cannot determine whether the commander or the other general is the traitor.
B.The communication complexity becomes O(n!) which is computationally intractable for n=3, causing the system to halt.
C.The traitorous commander can successfully frame a loyal lieutenant by sending them a different message than the one sent to the other loyal lieutenant.
D.The two loyal lieutenants will always agree to a default action (e.g., retreat) when they receive conflicting messages, but this may not be the commander's true order.
Correct Answer: A loyal lieutenant receives conflicting reports about the commander's order from the other general and cannot determine whether the commander or the other general is the traitor.
Explanation:
In the n=3, f=1 case, imagine a loyal lieutenant (L1) receives 'attack' from the Commander (C). L1 then asks the other lieutenant (L2) what they received. If C is the traitor, they might have sent 'retreat' to L2. If L2 is the traitor, they might lie and claim they received 'retreat' from a loyal C. From L1's perspective, the world state is identical in both cases. This ambiguity makes it impossible for L1 to achieve consensus, illustrating the core reason for the n > 3f requirement.
Incorrect! Try again.
42In the context of the 'Blockchain Trilemma' (Decentralization, Security, Scalability), how do Layer-2 solutions like the Lightning Network primarily attempt to solve the scalability problem?
Consensus algorithms and their scalability problems
Hard
A.By increasing the block size limit, which enhances scalability but weakens decentralization by increasing the hardware requirements for running a full node.
B.By replacing Proof-of-Work with Proof-of-Stake, which improves scalability by reducing block time but centralizes power in the hands of large stakeholders.
C.By moving the majority of transactions off-chain into payment channels, thereby sacrificing a degree of immediate on-chain security and decentralization for massive throughput gains.
D.By implementing sharding, which partitions the network state to increase parallel processing, but introduces new security challenges in cross-shard communication.
Correct Answer: By moving the majority of transactions off-chain into payment channels, thereby sacrificing a degree of immediate on-chain security and decentralization for massive throughput gains.
Explanation:
Layer-2 solutions operate by creating channels where parties can transact privately and almost instantaneously. Only the opening and closing of these channels are broadcast to the main chain (Layer-1). This drastically improves scalability. However, it trades off the full, immediate security and decentralization of the main chain, as funds in a channel are governed by a smaller set of participants and smart contracts, introducing different, localized security assumptions.
Incorrect! Try again.
43From a game theory perspective, what is the primary economic disincentive that discourages a 'selfish mining' attack in a Proof-of-Work blockchain, even if a miner has significant (e.g., 30%) but not majority hash power?
Nakamoto’s concept with Blockchain based cryptocurrency
Hard
A.Other miners can confiscate the selfish miner's block reward by solving a special cryptographic puzzle designed to punish such behavior.
B.The network protocol automatically detects the withheld blocks and permanently bans the miner's public key from receiving future rewards.
C.The attacker must pay a significant transaction fee penalty for every block they successfully add to the chain through selfish mining.
D.The attacker risks their secretly mined blocks becoming orphaned if the honest chain finds a block and propagates it faster, causing the attacker to lose all block rewards for their withheld blocks.
Correct Answer: The attacker risks their secretly mined blocks becoming orphaned if the honest chain finds a block and propagates it faster, causing the attacker to lose all block rewards for their withheld blocks.
Explanation:
Selfish mining involves a miner finding a block but keeping it secret, hoping to find another block to create a longer secret chain. The risk is that while they are working on their secret chain, the rest of the network finds a block for the public chain. If the public chain gets extended before the selfish miner can publish their longer chain, all their secret work is wasted (orphaned), and they forfeit the potential block rewards. This risk of wasted computational effort and lost rewards is the main economic deterrent.
Incorrect! Try again.
44While both use hash pointers, the data structure of a blockchain (a linked list) and a Merkle tree serve fundamentally different primary purposes. Which statement best synthesizes this difference?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Hard
A.A blockchain's hash pointers ensure confidentiality, while a Merkle tree's hash pointers ensure data availability.
B.A blockchain's hash pointers are designed for efficient data retrieval, whereas a Merkle tree's hash pointers are designed for data compression.
C.A blockchain uses hash pointers to link servers in a distributed network, while a Merkle tree uses them to link transactions to user wallets.
D.A blockchain's hash pointers create a chronologically ordered, tamper-evident ledger of blocks, while a Merkle tree's hash pointers create a positionally-dependent, tamper-evident summary of a set of items within a single block.
Correct Answer: A blockchain's hash pointers create a chronologically ordered, tamper-evident ledger of blocks, while a Merkle tree's hash pointers create a positionally-dependent, tamper-evident summary of a set of items within a single block.
Explanation:
The key distinction is the scope and purpose. The blockchain's linked-list structure uses hash pointers to enforce a total, immutable history between blocks over time. Changing any past block invalidates all subsequent block hashes. A Merkle tree uses the same hash pointer concept within a single block to create an efficient, verifiable summary of all transactions. It proves a transaction's inclusion and position without needing to know about any other transaction, which is crucial for SPV (Simplified Payment Verification).
Incorrect! Try again.
45Consider a distributed system of n nodes that aims to be resilient. Which of the following statements correctly models the relationship between the number of tolerable faults (f) and the fault model assumptions?
Modeling faults and adversaries
Hard
A.A system can tolerate f Byzantine faults with only f+1 nodes if all messages are digitally signed and verifiable by all parties.
B.The assumption of a synchronous network (i.e., known bounds on message delay) allows a system to tolerate f Byzantine faults with just 2f+1 nodes.
C.A system tolerating f Byzantine faults requires at least 3f+1 total nodes, whereas a system tolerating f crash faults only requires 2f+1 total nodes for asynchronous consensus.
D.Crash faults and omission faults are considered identical in most threat models as they both result in a non-responsive node.
Correct Answer: A system tolerating f Byzantine faults requires at least 3f+1 total nodes, whereas a system tolerating f crash faults only requires 2f+1 total nodes for asynchronous consensus.
Explanation:
This question tests the understanding of the strict requirements imposed by different fault models. BFT algorithms like PBFT require n >= 3f+1 to handle malicious actors who can lie and equivocate. Crash-fault tolerant algorithms like Paxos and Raft only need to overcome non-responsive nodes, and thus have a lower requirement of n >= 2f+1 to be able to form a majority quorum even if f nodes fail.
Incorrect! Try again.
46Practical Byzantine Fault Tolerance (PBFT) is a classical consensus algorithm that provides deterministic finality but faces scalability issues. What is the primary bottleneck that limits the number of nodes in a PBFT network?
Consensus algorithms and their scalability problems
Hard
A.The computational expense of verifying digital signatures on every message, which grows linearly with the number of nodes.
B.The quadratic message complexity () of the all-to-all communication required in its pre-prepare, prepare, and commit phases.
C.The requirement for a single, publicly known leader node, which creates a performance and centralization bottleneck.
D.The excessive energy consumption required to reach consensus, which is comparable to Proof-of-Work.
Correct Answer: The quadratic message complexity () of the all-to-all communication required in its pre-prepare, prepare, and commit phases.
Explanation:
In PBFT, for each consensus instance, nodes must broadcast messages to all other nodes in multiple phases (prepare, commit). This results in a communication overhead that scales with the square of the number of nodes (n). As n grows, the network traffic becomes overwhelming, making PBFT impractical for large, open-permissionless networks and limiting it to smaller, permissioned consortiums.
Incorrect! Try again.
47A traditional, centralized replicated database and a blockchain-based distributed ledger both aim for data consistency across multiple nodes. What is the most crucial difference in their underlying trust models?
Need for distributed record keeping
Hard
A.A replicated database can only handle structured data (SQL), while a blockchain is optimized for unstructured data.
B.A replicated database requires all nodes to be online simultaneously to process transactions, while a blockchain allows for asynchronous participation.
C.A replicated database assumes a trusted administrator controls all nodes and protects the primary data source, whereas a blockchain assumes no single party is trusted and that adversaries exist within the network.
D.A replicated database uses ACID (Atomicity, Consistency, Isolation, Durability) transactions, while a blockchain uses BASE (Basically Available, Soft state, Eventual consistency).
Correct Answer: A replicated database assumes a trusted administrator controls all nodes and protects the primary data source, whereas a blockchain assumes no single party is trusted and that adversaries exist within the network.
Explanation:
The core innovation of distributed ledgers is not just distribution but the management of trust. In a classic client-server or primary-backup database model, there is an inherent trust in the central administrator who controls the 'master' copy and the replication process. Blockchains are designed for adversarial environments where participants do not trust each other, and consensus rules are used to agree on the state of the ledger without relying on a central coordinator.
Incorrect! Try again.
48David Chaum's ecash is often cited as a precursor to cryptocurrencies. What fundamental architectural difference between ecash and Bitcoin explains their different privacy properties?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Hard
A.Ecash used a centralized but privacy-preserving mint with blind signatures to achieve true anonymity, whereas Bitcoin uses a decentralized ledger with pseudonymous addresses.
B.Ecash transactions were publicly broadcast on a peer-to-peer network, while Bitcoin transactions are sent to a central clearinghouse.
C.Ecash required users to solve computational puzzles to create money, while Bitcoin's supply is controlled by a central bank algorithm.
D.Ecash relied on asymmetric cryptography for privacy, while Bitcoin relies on symmetric-key encryption.
Correct Answer: Ecash used a centralized but privacy-preserving mint with blind signatures to achieve true anonymity, whereas Bitcoin uses a decentralized ledger with pseudonymous addresses.
Explanation:
Chaum's ecash was a centralized system. A bank (the mint) would sign a digital coin without knowing its serial number, thanks to a cryptographic primitive called a 'blind signature'. This made the coin spendable but untraceable back to the withdrawer, providing true anonymity. Bitcoin, in contrast, is decentralized. All transactions are public on the blockchain. Privacy is derived from pseudonymity—the fact that addresses are not directly linked to real-world identities, though transaction patterns can be analyzed to de-anonymize users.
Incorrect! Try again.
49A 51% attack on a Proof-of-Work blockchain allows an attacker to reliably double-spend transactions and censor future transactions. However, what is a major action that even a successful 51% attacker cannot perform?
Nakamoto’s concept with Blockchain based cryptocurrency
Hard
A.Prevent all other miners on the network from ever finding a valid block again.
B.Steal bitcoins from an address for which they do not possess the private key or change the rules of the consensus algorithm retroactively.
C.Create new coins out of thin air, beyond the protocol-defined block reward and transaction fees.
D.Reverse any transaction that has ever been confirmed on the blockchain since the genesis block.
Correct Answer: Steal bitcoins from an address for which they do not possess the private key or change the rules of the consensus algorithm retroactively.
Explanation:
A 51% attack gives the attacker control over the ordering of new transactions and the ability to create a longer chain, thus invalidating recent blocks on the honest chain. However, the attacker is still bound by the protocol's consensus rules. They cannot create invalid transactions (e.g., spending coins without the corresponding private key's signature) because such a block would be rejected by all other nodes on the network as invalid, regardless of the amount of work put into it.
Incorrect! Try again.
50How does the use of digital signatures (authenticated messages) fundamentally alter the requirements for solving the Byzantine Generals Problem, compared to using oral (unauthenticated) messages?
Byzantine generals problem
Hard
A.It eliminates the need for multiple rounds of communication, allowing for consensus in a single message-passing phase.
B.It guarantees that traitors cannot drop or refuse to forward messages from loyal generals.
C.It allows the problem to be solved in a fully asynchronous network environment, which is impossible with oral messages.
D.It lowers the required number of total generals from n > 3f to n > f, as forged messages can be proven false, eliminating ambiguity.
Correct Answer: It lowers the required number of total generals from n > 3f to n > f, as forged messages can be proven false, eliminating ambiguity.
Explanation:
With oral messages, a traitor can lie to different generals, creating the ambiguity described in the n=3, f=1 case. With digital signatures, a message is tied to its originator. If a commander sends a signed 'attack' order to L1, and L2 claims the commander sent a signed 'retreat' order, L1 can demand to see L2's signed message. If L2 cannot produce a validly signed 'retreat' order from the commander, they are exposed as a liar. This ability to prove authenticity and non-repudiation removes the core ambiguity, thus drastically reducing the number of loyal nodes required to overcome traitors. In fact, any number of traitors f can be tolerated as long as n > f.
Incorrect! Try again.
51Probabilistic finality (as seen in Nakamoto consensus) and deterministic finality (as seen in PBFT) are two models for transaction confirmation. Which statement most accurately contrasts their implications for an application built on the blockchain?
Consensus algorithms and their scalability problems
Hard
A.Deterministic finality means a transaction is final once included in a block, while probabilistic finality requires waiting for a network-wide vote on each block.
B.Nakamoto consensus offers deterministic finality after 6 confirmations, while PBFT offers probabilistic finality based on the number of active validators.
C.Probabilistic finality is faster but less secure, while deterministic finality is slower but offers higher security against 51% attacks.
D.An application requiring absolute certainty of a transaction's irreversibility after confirmation would favor PBFT, whereas an application that can tolerate a minuscule, decreasing probability of reversal would be suitable for PoW.
Correct Answer: An application requiring absolute certainty of a transaction's irreversibility after confirmation would favor PBFT, whereas an application that can tolerate a minuscule, decreasing probability of reversal would be suitable for PoW.
Explanation:
In Nakamoto consensus (PoW), finality is probabilistic. The more blocks are built on top of a transaction's block, the exponentially more difficult (and thus less probable) it becomes to reverse it. But the probability never reaches zero. In PBFT, once a block has gone through the commit phase and has been agreed upon by 2f+1 nodes, it is deterministically final and cannot be reverted unless more than f nodes are proven to be corrupt retroactively. This makes PBFT suitable for applications like financial settlements where even a tiny chance of reversal is unacceptable.
Incorrect! Try again.
52A 'Sybil attack' is a significant threat in decentralized P2P networks. How does Nakamoto's Proof-of-Work mechanism directly function as a defense against this specific type of attack?
Modeling faults and adversaries
Hard
A.By encrypting the identities of all nodes, it prevents an attacker from knowing who to target to create fake identities.
B.By making the creation of a valid identity (i.e., a valid block) computationally expensive, it ties 'voting power' to a scarce real-world resource (hash rate) rather than easily-faked network identifiers.
C.By limiting the number of IP addresses that can connect to a single node, it physically constrains the number of Sybil identities an attacker can create.
D.By requiring every new node to be approved by a majority of existing nodes, it prevents an adversary from adding a large number of nodes at once.
Correct Answer: By making the creation of a valid identity (i.e., a valid block) computationally expensive, it ties 'voting power' to a scarce real-world resource (hash rate) rather than easily-faked network identifiers.
Explanation:
A Sybil attack is when an adversary creates a large number of pseudonymous identities to gain a disproportionately large influence. In a naive voting system ('one IP, one vote'), this is easy. Proof-of-Work counters this by redefining what a 'vote' is. Instead of being based on a cheap-to-create identity, a vote (in the form of a valid block) is based on proof of expended computational energy. An attacker wanting 1,000 votes must perform 1,000 times the work, making the attack prohibitively expensive. It makes identity costly.
Incorrect! Try again.
53The Bitcoin protocol includes a difficulty adjustment algorithm that targets a 10-minute average block time. If a sudden, massive technological breakthrough doubles the global hash rate instantly, what is the most precise description of the immediate and subsequent effects on the network?
Nakamoto’s concept with Blockchain based cryptocurrency
Hard
A.Initially, the average block time will drop to approximately 5 minutes. This will persist until the next difficulty adjustment period (2016 blocks), at which point the difficulty will approximately double to bring the block time back to 10 minutes.
B.The average block time will remain at 10 minutes, as the algorithm adjusts the difficulty in real-time after each block is mined.
C.The network will immediately fork, as older nodes cannot process blocks being produced at double the speed.
D.Block rewards will be automatically halved to disincentivize miners from using the new technology and destabilizing the network.
Correct Answer: Initially, the average block time will drop to approximately 5 minutes. This will persist until the next difficulty adjustment period (2016 blocks), at which point the difficulty will approximately double to bring the block time back to 10 minutes.
Explanation:
The difficulty in Bitcoin is not adjusted in real-time. It is recalculated every 2016 blocks based on the time it took to mine the previous 2016 blocks. If the hash rate doubles, the time to find a block with the current difficulty will be halved. This faster block production (approx. 5 min) will continue until 2016 blocks are mined (which will take about 1 week instead of 2). At that point, the protocol will see that the blocks were found too quickly and will adjust the difficulty upward by a factor of approximately two, restoring the 10-minute target.
Incorrect! Try again.
54Which specific property of cryptographic hash functions is most critical for ensuring the tamper-evident nature of a blockchain's linked-list structure?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Hard
A.Pre-image Resistance (One-way): It is computationally infeasible to find the input message from its hash value.
B.Fixed-Size Output: Any size of input data maps to a fixed-size hash value.
C.Deterministic: The same input message will always produce the same hash output.
D.Second Pre-image Resistance: It is computationally infeasible to find a different input that produces the same hash as a given input.
Correct Answer: Second Pre-image Resistance: It is computationally infeasible to find a different input that produces the same hash as a given input.
Explanation:
While several properties are important, second pre-image resistance is the key. A block's hash is computed from its contents AND the hash of the previous block. If an attacker modifies the contents of a past block (Block N), they would need to find a new set of contents for the next block (Block N+1) that, when combined with the new hash of Block N, produces the exact same original hash for Block N+1. This is finding a second pre-image, which is computationally infeasible. This infeasibility is what makes the chain's history effectively immutable.
Incorrect! Try again.
55Beyond fault tolerance, what is a primary economic or political motivation for using a distributed ledger in a consortium of competing companies (e.g., for supply chain management)?
Need for distributed record keeping
Hard
A.It significantly reduces the cost of data storage compared to each company maintaining its own centralized database.
B.It provides a mechanism for the consortium to issue its own currency to pay for transaction fees and incentivize participation.
C.It guarantees complete anonymity and confidentiality of all transaction data from all other members of the consortium.
D.It establishes a neutral ground for record-keeping, where no single company has unilateral control over the shared data or the rules governing it, thus fostering trust among competitors.
Correct Answer: It establishes a neutral ground for record-keeping, where no single company has unilateral control over the shared data or the rules governing it, thus fostering trust among competitors.
Explanation:
In a business consortium, the participants are often competitors who do not fully trust each other. If one company hosts the central database, the others must trust it not to tamper with data or deny access. A distributed ledger provides a shared, single source of truth that is not owned or controlled by any one entity. All participants validate transactions according to pre-agreed rules (smart contracts), creating a level playing field and reducing the need for costly reconciliation and trust-building exercises.
Incorrect! Try again.
56Delegated Proof-of-Stake (DPoS) aims to improve scalability over traditional PoS by limiting the number of block-producing nodes (witnesses/delegates). This design represents a direct trade-off that prioritizes performance by potentially sacrificing which core blockchain principle?
Consensus algorithms and their scalability problems
Hard
A.Security, as having fewer validators makes the network inherently more vulnerable to denial-of-service attacks.
B.Open participation, as users must pay a high fee to become a delegate candidate.
C.Decentralization, as it concentrates the power of block production and transaction validation into a small, elected group of nodes.
D.Data availability, as the elected delegates are not required to store the entire history of the blockchain.
Correct Answer: Decentralization, as it concentrates the power of block production and transaction validation into a small, elected group of nodes.
Explanation:
DPoS achieves high transaction throughput because consensus only needs to be reached among a small, known set of delegates (e.g., 21 in EOS). This is much faster than coordinating among thousands of anonymous nodes in PoW or PoS. The explicit trade-off is a reduction in decentralization. The network's liveness and censorship resistance become dependent on this small group of elected officials, which introduces a greater degree of centralization and potential for collusion compared to systems where anyone can theoretically produce a block.
Incorrect! Try again.
57In the context of distributed systems, how does an 'omission fault' differ from both a 'crash fault' and a 'Byzantine fault', and what specific challenges does it present?
Modeling faults and adversaries
Hard
A.An omission fault is when a node selectively fails to send or receive some messages but otherwise functions correctly, making it harder to detect than a crashed node but less malicious than a Byzantine node.
B.An omission fault is identical to a Byzantine fault, but it only affects outgoing messages, not incoming ones.
C.An omission fault specifically refers to a node dropping messages due to network congestion, which is not considered a fault of the node itself.
D.An omission fault is a temporary crash fault from which the node can recover its previous state and continue operating.
Correct Answer: An omission fault is when a node selectively fails to send or receive some messages but otherwise functions correctly, making it harder to detect than a crashed node but less malicious than a Byzantine node.
Explanation:
This question tests nuanced understanding of fault models. A crash fault is simple: the node stops completely. A Byzantine fault is worst-case: the node can do anything, including lying. An omission fault lies in between. The node is alive and may respond to some requests, but it fails to send/receive certain messages. This is challenging because the node appears intermittently faulty, making it difficult for other nodes to distinguish between a node that is malicious, a node that has failed, or a network partition.
Incorrect! Try again.
58The 'unspent transaction output' (UTXO) model used by Bitcoin is a core component of its design. How does the UTXO model fundamentally contribute to preventing double-spends in a decentralized environment?
Nakamoto’s concept with Blockchain based cryptocurrency
Hard
A.It forces every transaction to explicitly consume specific, existing UTXOs as inputs and create new ones as outputs, making it impossible to create a valid transaction that spends the same UTXO twice.
B.It encrypts each UTXO with the owner's public key, preventing anyone else from creating a transaction that spends it.
C.It assigns a global, sequential serial number to each UTXO, and the consensus rules reject any transaction that attempts to spend a serial number that is already marked as spent.
D.It functions as an account-based system where the balance of each address is checked before a transaction is processed to ensure sufficient funds.
Correct Answer: It forces every transaction to explicitly consume specific, existing UTXOs as inputs and create new ones as outputs, making it impossible to create a valid transaction that spends the same UTXO twice.
Explanation:
The UTXO model is a verification paradigm, not an account model. Each valid transaction must reference one or more existing, unspent outputs as its inputs. Once a UTXO is used as an input in a transaction that gets included in the blockchain, it is considered 'spent' and cannot be used again. Any subsequent transaction attempting to reference that same UTXO as an input is, by definition, invalid and will be rejected by the network. This provides a clear, stateless way for any node to verify the validity of a transaction without needing to know the entire history or balance of an 'account'.
Incorrect! Try again.
59What is the relationship between a consensus algorithm that solves the Byzantine Generals Problem and one that is 'Byzantine Fault Tolerant' (BFT)?
Byzantine generals problem
Hard
A.The Byzantine Generals Problem only applies to synchronous systems, while BFT algorithms are designed for asynchronous networks.
B.They are effectively the same concept; a BFT algorithm is a practical, implementable solution to the abstract Byzantine Generals Problem.
C.BFT is a specific algorithm (like PBFT), whereas the Byzantine Generals Problem is a class of hardware faults in distributed computing.
D.but it also must handle other network conditions like liveness (guaranteeing progress) in addition to safety (correctness).
E.A BFT algorithm must solve the Byzantine Generals Problem
F.MODIFIED_
Correct Answer: A BFT algorithm must solve the Byzantine Generals Problem, but it also must handle other network conditions like liveness (guaranteeing progress) in addition to safety (correctness).
Explanation:
This is a subtle but important distinction. The Byzantine Generals Problem is the core abstract problem of reaching agreement in the presence of malicious actors (traitors). A Byzantine Fault Tolerant (BFT) algorithm is a concrete protocol that solves this problem. However, a practical BFT algorithm must do more than just solve the agreement problem (safety). It must also ensure that the system continues to make progress and process new transactions (liveness), often under partially synchronous or asynchronous network conditions, which the original problem statement did not fully specify.
Incorrect! Try again.
60Simplified Payment Verification (SPV) nodes in Bitcoin rely on Merkle proofs to verify transactions without downloading the entire blockchain. This efficiency comes with a security trade-off. What is the primary security risk an SPV node is exposed to that a full node is not?
Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc.
Hard
A.An SPV node cannot verify if a transaction's inputs have been double-spent, as this requires the full UTXO set.
B.An SPV node can be fooled into accepting a block with an invalid transaction (e.g., creating coins from nothing) if it receives a valid Merkle proof for that transaction's inclusion in the block.
C.An SPV node could be tricked by a majority of miners into accepting a transaction that is part of a block on a shorter, invalid fork, without being aware that a longer, valid chain exists.
D.An SPV node's transactions can be stolen by a man-in-the-middle attack, whereas a full node's cannot.
Correct Answer: An SPV node can be fooled into accepting a block with an invalid transaction (e.g., creating coins from nothing) if it receives a valid Merkle proof for that transaction's inclusion in the block.
Explanation:
An SPV node downloads only block headers. It verifies the proof-of-work on the headers and uses a Merkle proof to confirm its transaction is included in a block. However, it does not download and validate all transactions in that block. Therefore, if a majority of miners collude to create a block that contains an invalid transaction (like one that violates consensus rules by creating money), they can still create a valid header and a valid Merkle proof. The SPV node would accept this block as valid, while a full node would download all transactions, discover the invalid one, and reject the entire block.