Unit 1 - Practice Quiz

CSC203 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is a major disadvantage of a centralized ledger system?

Need for distributed record keeping Easy
A. It has a single point of failure.
B. It is very slow to update.
C. It is too transparent.
D. It requires all participants to be anonymous.

2 A hash pointer is a data structure that contains a pointer to some data along with what else?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Easy
A. A cryptographic hash of the data.
B. The timestamp of the data.
C. A digital signature of the data.
D. The public key of the data's creator.

3 The Byzantine Generals Problem is an analogy for describing the challenge of...

Byzantine generals problem Easy
A. achieving consensus in a distributed system with potentially malicious actors.
B. recovering data after a server crash.
C. storing large amounts of data efficiently.
D. encrypting messages between two parties.

4 What key problem in electronic cash systems did Satoshi Nakamoto's Bitcoin proposal solve using blockchain?

Nakamoto’s concept with Blockchain based cryptocurrency Easy
A. The problem of high transaction fees.
B. The double-spending problem.
C. The need for user anonymity.
D. The issue of slow international payments.

5 What is the primary purpose of a consensus algorithm in a blockchain network?

Consensus algorithms and their scalability problems Easy
A. To create new cryptocurrencies.
B. To reduce the size of the blockchain.
C. To ensure all nodes in the network agree on the state of the ledger.
D. To encrypt all transactions for privacy.

6 In the context of distributed systems, what is a 'Byzantine fault'?

Modeling faults and adversaries Easy
A. An error in the software's code.
B. A node that simply stops working or crashes.
C. A node behaving maliciously or in any arbitrary, unpredictable way.
D. A temporary network connection issue.

7 How do hash pointers contribute to the immutability of a blockchain?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Easy
A. By encrypting the data within each block.
B. By compressing the data to save space.
C. By creating a chain where changing a previous block would invalidate all subsequent blocks.
D. By ensuring only authorized users can add new blocks.

8 A key benefit of a distributed ledger is that it removes the need for...

Need for distributed record keeping Easy
A. a trusted central intermediary.
B. data storage.
C. an internet connection.
D. computer hardware.

9 What does 'Byzantine Fault Tolerance' (BFT) mean for a system?

Technologies Borrowed in Blockchain – byzantine fault-tolerant distributed computing, digital cash etc. Easy
A. The system is completely immune to all types of attacks.
B. The system relies on a central authority to resolve disputes.
C. The system can only handle simple crash faults.
D. The system can continue to operate correctly even if some nodes are malicious.

10 A common scalability problem for many consensus algorithms is that they can have low...

Consensus algorithms and their scalability problems Easy
A. data storage.
B. security.
C. decentralization.
D. transaction throughput.

11 The first block in any blockchain is commonly referred to as the...

Nakamoto’s concept with Blockchain based cryptocurrency Easy
A. Root Block.
B. Alpha Block.
C. Source Block.
D. Genesis Block.

12 A server in a network that completely stops responding is an example of a...

Modeling faults and adversaries Easy
A. Security fault.
B. Timing fault.
C. Crash fault.
D. Byzantine fault.

13 In the Byzantine Generals Problem, what is the consequence if the generals fail to reach a consensus?

Byzantine generals problem Easy
A. One general becomes the supreme commander.
B. The messages get encrypted and cannot be read.
C. The war ends in a peaceful truce.
D. Their coordinated attack or retreat fails, leading to defeat.

14 Which of the following is a well-known example of a consensus algorithm used in blockchain?

Technologies Borrowed in Blockchain – consensus Easy
A. Hypertext Transfer Protocol (HTTP).
B. Advanced Encryption Standard (AES).
C. Proof of Work (PoW).
D. Secure Hash Algorithm (SHA).

15 What does 'immutability' mean in the context of a blockchain ledger?

Need for distributed record keeping Easy
A. The ledger is completely anonymous.
B. The ledger is stored in a single, secure location.
C. Anyone can write data to the ledger without permission.
D. Once data is recorded, it cannot be altered or deleted.

16 The identity of Satoshi Nakamoto, the creator of Bitcoin, is...

Nakamoto’s concept with Blockchain based cryptocurrency Easy
A. the CEO of a major Japanese technology company.
B. known to be a team of developers at Google.
C. a pseudonym and remains unknown.
D. a well-known computer scientist named Hal Finney.

17 The concept of 'digital cash' existed before blockchain. What was its main weakness that blockchain addressed?

Technologies Borrowed in Blockchain – digital cash etc. Easy
A. It relied on a central authority to prevent double-spending.
B. It was too slow for practical use.
C. It was not based on cryptography.
D. It could not be transferred over the internet.

18 In a blockchain, what is a 'block'?

Consensus algorithms and their scalability problems Easy
A. A user's digital wallet.
B. The cryptographic key used for signing.
C. A collection of transactions that are bundled together and added to the chain.
D. A single transaction between two users.

19 What fundamental technology is used to create the 'hash' in a hash pointer?

Technologies Borrowed in Blockchain – byzantine fault-tolerant distributed computing, digital cash etc. Easy
A. A digital signature algorithm.
B. Public key encryption.
C. A random number generator.
D. A cryptographic hash function.

20 What does it mean for a network to reach 'consensus'?

Consensus algorithms and their scalability problems Easy
A. A majority of nodes agree on the same state.
B. A transaction has been encrypted.
C. The network administrator approves a transaction.
D. Every node is online at the same time.

21 A government wants to create a new land registry system to prevent fraudulent changes to property records. A traditional centralized database with backups is proposed, as is a blockchain-based distributed ledger. What is the primary advantage of the distributed ledger in this specific scenario?

Need for distributed record keeping Medium
A. It creates a tamper-evident and censorship-resistant record without relying on a single trusted administrator.
B. It is less expensive to set up and maintain than a centralized server with backups.
C. It is inherently immune to fraudulent entries by authorized officials.
D. It offers higher transaction processing speed than a centralized database.

22 In a system with 10 generals attempting to reach consensus, what is the maximum number of traitorous (Byzantine) generals that can be tolerated for the loyal generals to still reach a correct decision, assuming they use a traditional Byzantine fault-tolerant algorithm?

Byzantine generals problem Medium
A. 3
B. 5
C. 4
D. 2

23 How does Nakamoto's consensus mechanism (Proof-of-Work) address the double-spending problem in a decentralized network without a central authority?

Nakamoto’s concept with Blockchain based cryptocurrency Medium
A. By processing transactions in a strict first-in-first-out queue across the entire network.
B. By making it computationally expensive to rewrite history, and incentivizing nodes to extend the longest, valid chain.
C. By encrypting all transactions so they cannot be duplicated.
D. By requiring every user to have a unique, verified digital identity.

24 What is the specific function of a 'hash pointer' in the structure of a blockchain?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Medium
A. It points to the physical memory location of the previous block on a disk.
B. It encrypts the data within a block to ensure confidentiality.
C. It creates a tamper-evident link to the previous block by containing its cryptographic hash.
D. It provides a timestamp for when the block was created.

25 A blockchain network is described as facing the 'Blockchain Trilemma'. It is highly decentralized with thousands of nodes worldwide and has proven to be extremely secure against attacks. Based on the trilemma, which characteristic is most likely compromised?

Consensus algorithms and their scalability problems Medium
A. Immutability
B. Decentralization
C. Scalability
D. Security

26 In a permissionless blockchain network, an adversary creates thousands of fake identities (nodes) to gain a disproportionately large influence on the network's consensus or governance. What is this type of attack called?

Modeling faults and adversaries Medium
A. A Denial-of-Service (DoS) Attack
B. A 51% Attack
C. A Sybil Attack
D. An Eclipse Attack

27 How did the introduction of digital signatures (signed messages) change the requirements for solving the Byzantine Generals Problem compared to the original oral message scenario?

Byzantine generals problem Medium
A. It allows consensus with a higher proportion of traitors ().
B. It completely eliminates the possibility of traitorous behavior.
C. It allows loyal generals to prove the origin of a message, preventing traitors from forging orders.
D. It removes the need for generals to communicate with each other.

28 Why is a transaction in Bitcoin considered to have 'probabilistic finality' rather than 'deterministic finality'?

Nakamoto’s concept with Blockchain based cryptocurrency Medium
A. Because the transaction might be rolled back by a central administrator.
B. Because a longer, competing chain could emerge that orphans the block containing the transaction.
C. Because network latency can cause nodes to see the transaction at different times.
D. Because there is a small chance the cryptographic hash function can be broken.

29 A consortium of competing banks wants to create a shared ledger for inter-bank settlements. Why would a distributed ledger be more suitable than having one of the banks host a central database for all of them?

Need for distributed record keeping Medium
A. The other banks would be unable to audit the central database hosted by the single bank.
B. The central database would be technically incapable of handling the transaction volume.
C. A distributed ledger removes the need for any single bank to be the trusted intermediary, fostering equality and reducing counterparty risk.
D. Distributed ledgers are legally recognized as superior for financial settlements in all jurisdictions.

30 A proof-of-stake (PoS) blockchain is often considered more energy-efficient than a proof-of-work (PoW) blockchain. How does this characteristic relate to scalability?

Consensus algorithms and their scalability problems Medium
A. It has no relationship to scalability; it is purely an environmental benefit.
B. Energy efficiency directly increases the number of transactions per second.
C. It lowers the barrier to entry for becoming a validator, potentially increasing the number of participants and aiding decentralization without massive energy costs.
D. PoS systems use less energy because they process transactions one by one, which limits scalability.

31 Consider a distributed system where nodes can either crash and stop communicating entirely (a fail-stop fault) or continue operating but send deliberately incorrect and conflicting information (a Byzantine fault). Why is designing a consensus protocol for the Byzantine fault scenario significantly more complex?

Modeling faults and adversaries Medium
A. Because loyal nodes must distinguish between correct, malicious, and absent information, whereas in a fail-stop model, they only need to handle absent information.
B. Because fail-stop faults are rare in real-world systems.
C. Because crashed nodes can be easily rebooted, while malicious nodes cannot.
D. Because Byzantine faults require cryptographic signatures, which are computationally slow.

32 How does the finality provided by a Practical Byzantine Fault Tolerance (pBFT) consensus algorithm differ from the finality in Nakamoto's Proof-of-Work consensus?

Technologies Borrowed in Blockchain – byzantine fault-tolerant distributed computing Medium
A. pBFT provides no finality, while PoW provides probabilistic finality.
B. Both provide deterministic finality, but pBFT is faster.
C. pBFT provides deterministic finality after a round of voting, while PoW provides probabilistic finality that strengthens over time.
D. pBFT provides probabilistic finality, while PoW provides deterministic finality.

33 What is the primary function of the Unspent Transaction Output (UTXO) model used in Bitcoin, as compared to a traditional account/balance model?

Nakamoto’s concept with Blockchain based cryptocurrency Medium
A. To track individual 'coins' or chunks of cryptocurrency, which are consumed as inputs and created as outputs in transactions.
B. To link every transaction directly to a user's real-world identity.
C. To ensure every user's total balance is publicly visible on the ledger.
D. To simplify the process of calculating transaction fees for miners.

34 A blockchain network is attempting to improve its scalability by implementing 'sharding'. What is the fundamental principle behind sharding?

Consensus algorithms and their scalability problems Medium
A. Using a more powerful central server to process all transactions before they are added to the chain.
B. Increasing the block size limit to fit more transactions in each block.
C. Decreasing the block time to produce blocks more frequently.
D. Splitting the network's transaction load and state into smaller, parallel chains (shards) that are processed independently.

35 What core assumption about the network does a 51% attack on a Proof-of-Work blockchain challenge?

Modeling faults and adversaries Medium
A. That cryptographic hash functions are unbreakable.
B. That all nodes in the network have low-latency connections.
C. That the private keys of users cannot be stolen.
D. That the majority of the network's computational power is controlled by honest participants.

36 Early centralized digital cash systems like DigiCash provided strong privacy but had a significant drawback that blockchain solved. What was this key vulnerability?

Technologies Borrowed in Blockchain – digital cash etc. Medium
A. They could not prevent users from making copies of their digital money.
B. They were unable to process micropayments efficiently.
C. They relied on a central operator, which was a single point of failure and control.
D. They used outdated and insecure encryption methods.

37 In the context of blockchain, how does Proof-of-Work (PoW) act as a practical, probabilistic solution to the Byzantine Generals Problem in a permissionless setting?

Byzantine generals problem Medium
A. It creates a hierarchy of nodes where only 'general' nodes can propose blocks.
B. It requires all nodes to digitally sign their votes, guaranteeing consensus.
C. It makes proposing a version of the 'truth' (a block) computationally expensive, and uses the longest chain as the consensus, effectively letting 'work' be the deciding vote.
D. It identifies and ejects all Byzantine nodes from the network.

38 A blockchain has a block size of 2 MB and a block time of 10 minutes. The average transaction size is 500 bytes. Which of the following changes would most directly increase the network's transactions per second (TPS)?

Consensus algorithms and their scalability problems Medium
A. Decreasing the block reward for miners.
B. Increasing the number of miners on the network.
C. Decreasing the block time to 5 minutes while keeping the block size at 2 MB.
D. Increasing the mining difficulty to make the network more secure.

39 When comparing a replicated database in a traditional client-server architecture with a blockchain, both provide data redundancy. What critical capability does the blockchain offer that a simple replicated database does not?

Need for distributed record keeping Medium
A. Consensus on the state of the record among parties that do not trust each other.
B. Faster data retrieval and query performance.
C. Guaranteed 100% uptime and availability.
D. The ability to store large amounts of data.

40 In Bitcoin's design, what is the economic purpose of transaction fees, especially in the long term?

Nakamoto’s concept with Blockchain based cryptocurrency Medium
A. To punish users who send too many spam transactions.
B. To serve as the primary incentive for miners to secure the network after the block reward subsidy eventually diminishes to zero.
C. To pay for the network's electricity consumption directly.
D. To create a secondary market for users to trade their unspent transaction outputs.

41 The famous impossibility result for the Byzantine Generals Problem states that no solution with oral (unauthenticated) messages can tolerate f traitors if the total number of generals n is less than or equal to 3f. Which scenario best explains the fundamental breakdown when n = 3 and f = 1?

Byzantine generals problem Hard
A. The traitorous commander can successfully frame a loyal lieutenant by sending them a different message than the one sent to the other loyal lieutenant.
B. The communication complexity becomes O(n!) which is computationally intractable for n=3, causing the system to halt.
C. A loyal lieutenant receives conflicting reports about the commander's order from the other general and cannot determine whether the commander or the other general is the traitor.
D. The two loyal lieutenants will always agree to a default action (e.g., retreat) when they receive conflicting messages, but this may not be the commander's true order.

42 In the context of the 'Blockchain Trilemma' (Decentralization, Security, Scalability), how do Layer-2 solutions like the Lightning Network primarily attempt to solve the scalability problem?

Consensus algorithms and their scalability problems Hard
A. By replacing Proof-of-Work with Proof-of-Stake, which improves scalability by reducing block time but centralizes power in the hands of large stakeholders.
B. By moving the majority of transactions off-chain into payment channels, thereby sacrificing a degree of immediate on-chain security and decentralization for massive throughput gains.
C. By increasing the block size limit, which enhances scalability but weakens decentralization by increasing the hardware requirements for running a full node.
D. By implementing sharding, which partitions the network state to increase parallel processing, but introduces new security challenges in cross-shard communication.

43 From a game theory perspective, what is the primary economic disincentive that discourages a 'selfish mining' attack in a Proof-of-Work blockchain, even if a miner has significant (e.g., 30%) but not majority hash power?

Nakamoto’s concept with Blockchain based cryptocurrency Hard
A. The attacker risks their secretly mined blocks becoming orphaned if the honest chain finds a block and propagates it faster, causing the attacker to lose all block rewards for their withheld blocks.
B. Other miners can confiscate the selfish miner's block reward by solving a special cryptographic puzzle designed to punish such behavior.
C. The attacker must pay a significant transaction fee penalty for every block they successfully add to the chain through selfish mining.
D. The network protocol automatically detects the withheld blocks and permanently bans the miner's public key from receiving future rewards.

44 While both use hash pointers, the data structure of a blockchain (a linked list) and a Merkle tree serve fundamentally different primary purposes. Which statement best synthesizes this difference?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Hard
A. A blockchain uses hash pointers to link servers in a distributed network, while a Merkle tree uses them to link transactions to user wallets.
B. A blockchain's hash pointers ensure confidentiality, while a Merkle tree's hash pointers ensure data availability.
C. A blockchain's hash pointers are designed for efficient data retrieval, whereas a Merkle tree's hash pointers are designed for data compression.
D. A blockchain's hash pointers create a chronologically ordered, tamper-evident ledger of blocks, while a Merkle tree's hash pointers create a positionally-dependent, tamper-evident summary of a set of items within a single block.

45 Consider a distributed system of n nodes that aims to be resilient. Which of the following statements correctly models the relationship between the number of tolerable faults (f) and the fault model assumptions?

Modeling faults and adversaries Hard
A. Crash faults and omission faults are considered identical in most threat models as they both result in a non-responsive node.
B. A system tolerating f Byzantine faults requires at least 3f+1 total nodes, whereas a system tolerating f crash faults only requires 2f+1 total nodes for asynchronous consensus.
C. A system can tolerate f Byzantine faults with only f+1 nodes if all messages are digitally signed and verifiable by all parties.
D. The assumption of a synchronous network (i.e., known bounds on message delay) allows a system to tolerate f Byzantine faults with just 2f+1 nodes.

46 Practical Byzantine Fault Tolerance (PBFT) is a classical consensus algorithm that provides deterministic finality but faces scalability issues. What is the primary bottleneck that limits the number of nodes in a PBFT network?

Consensus algorithms and their scalability problems Hard
A. The quadratic message complexity () of the all-to-all communication required in its pre-prepare, prepare, and commit phases.
B. The requirement for a single, publicly known leader node, which creates a performance and centralization bottleneck.
C. The computational expense of verifying digital signatures on every message, which grows linearly with the number of nodes.
D. The excessive energy consumption required to reach consensus, which is comparable to Proof-of-Work.

47 A traditional, centralized replicated database and a blockchain-based distributed ledger both aim for data consistency across multiple nodes. What is the most crucial difference in their underlying trust models?

Need for distributed record keeping Hard
A. A replicated database uses ACID (Atomicity, Consistency, Isolation, Durability) transactions, while a blockchain uses BASE (Basically Available, Soft state, Eventual consistency).
B. A replicated database can only handle structured data (SQL), while a blockchain is optimized for unstructured data.
C. A replicated database assumes a trusted administrator controls all nodes and protects the primary data source, whereas a blockchain assumes no single party is trusted and that adversaries exist within the network.
D. A replicated database requires all nodes to be online simultaneously to process transactions, while a blockchain allows for asynchronous participation.

48 David Chaum's ecash is often cited as a precursor to cryptocurrencies. What fundamental architectural difference between ecash and Bitcoin explains their different privacy properties?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Hard
A. Ecash used a centralized but privacy-preserving mint with blind signatures to achieve true anonymity, whereas Bitcoin uses a decentralized ledger with pseudonymous addresses.
B. Ecash relied on asymmetric cryptography for privacy, while Bitcoin relies on symmetric-key encryption.
C. Ecash transactions were publicly broadcast on a peer-to-peer network, while Bitcoin transactions are sent to a central clearinghouse.
D. Ecash required users to solve computational puzzles to create money, while Bitcoin's supply is controlled by a central bank algorithm.

49 A 51% attack on a Proof-of-Work blockchain allows an attacker to reliably double-spend transactions and censor future transactions. However, what is a major action that even a successful 51% attacker cannot perform?

Nakamoto’s concept with Blockchain based cryptocurrency Hard
A. Reverse any transaction that has ever been confirmed on the blockchain since the genesis block.
B. Steal bitcoins from an address for which they do not possess the private key or change the rules of the consensus algorithm retroactively.
C. Create new coins out of thin air, beyond the protocol-defined block reward and transaction fees.
D. Prevent all other miners on the network from ever finding a valid block again.

50 How does the use of digital signatures (authenticated messages) fundamentally alter the requirements for solving the Byzantine Generals Problem, compared to using oral (unauthenticated) messages?

Byzantine generals problem Hard
A. It lowers the required number of total generals from n > 3f to n > f, as forged messages can be proven false, eliminating ambiguity.
B. It allows the problem to be solved in a fully asynchronous network environment, which is impossible with oral messages.
C. It eliminates the need for multiple rounds of communication, allowing for consensus in a single message-passing phase.
D. It guarantees that traitors cannot drop or refuse to forward messages from loyal generals.

51 Probabilistic finality (as seen in Nakamoto consensus) and deterministic finality (as seen in PBFT) are two models for transaction confirmation. Which statement most accurately contrasts their implications for an application built on the blockchain?

Consensus algorithms and their scalability problems Hard
A. Deterministic finality means a transaction is final once included in a block, while probabilistic finality requires waiting for a network-wide vote on each block.
B. An application requiring absolute certainty of a transaction's irreversibility after confirmation would favor PBFT, whereas an application that can tolerate a minuscule, decreasing probability of reversal would be suitable for PoW.
C. Probabilistic finality is faster but less secure, while deterministic finality is slower but offers higher security against 51% attacks.
D. Nakamoto consensus offers deterministic finality after 6 confirmations, while PBFT offers probabilistic finality based on the number of active validators.

52 A 'Sybil attack' is a significant threat in decentralized P2P networks. How does Nakamoto's Proof-of-Work mechanism directly function as a defense against this specific type of attack?

Modeling faults and adversaries Hard
A. By encrypting the identities of all nodes, it prevents an attacker from knowing who to target to create fake identities.
B. By requiring every new node to be approved by a majority of existing nodes, it prevents an adversary from adding a large number of nodes at once.
C. By making the creation of a valid identity (i.e., a valid block) computationally expensive, it ties 'voting power' to a scarce real-world resource (hash rate) rather than easily-faked network identifiers.
D. By limiting the number of IP addresses that can connect to a single node, it physically constrains the number of Sybil identities an attacker can create.

53 The Bitcoin protocol includes a difficulty adjustment algorithm that targets a 10-minute average block time. If a sudden, massive technological breakthrough doubles the global hash rate instantly, what is the most precise description of the immediate and subsequent effects on the network?

Nakamoto’s concept with Blockchain based cryptocurrency Hard
A. The network will immediately fork, as older nodes cannot process blocks being produced at double the speed.
B. The average block time will remain at 10 minutes, as the algorithm adjusts the difficulty in real-time after each block is mined.
C. Block rewards will be automatically halved to disincentivize miners from using the new technology and destabilizing the network.
D. Initially, the average block time will drop to approximately 5 minutes. This will persist until the next difficulty adjustment period (2016 blocks), at which point the difficulty will approximately double to bring the block time back to 10 minutes.

54 Which specific property of cryptographic hash functions is most critical for ensuring the tamper-evident nature of a blockchain's linked-list structure?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Hard
A. Pre-image Resistance (One-way): It is computationally infeasible to find the input message from its hash value.
B. Deterministic: The same input message will always produce the same hash output.
C. Second Pre-image Resistance: It is computationally infeasible to find a different input that produces the same hash as a given input.
D. Fixed-Size Output: Any size of input data maps to a fixed-size hash value.

55 Beyond fault tolerance, what is a primary economic or political motivation for using a distributed ledger in a consortium of competing companies (e.g., for supply chain management)?

Need for distributed record keeping Hard
A. It guarantees complete anonymity and confidentiality of all transaction data from all other members of the consortium.
B. It provides a mechanism for the consortium to issue its own currency to pay for transaction fees and incentivize participation.
C. It establishes a neutral ground for record-keeping, where no single company has unilateral control over the shared data or the rules governing it, thus fostering trust among competitors.
D. It significantly reduces the cost of data storage compared to each company maintaining its own centralized database.

56 Delegated Proof-of-Stake (DPoS) aims to improve scalability over traditional PoS by limiting the number of block-producing nodes (witnesses/delegates). This design represents a direct trade-off that prioritizes performance by potentially sacrificing which core blockchain principle?

Consensus algorithms and their scalability problems Hard
A. Security, as having fewer validators makes the network inherently more vulnerable to denial-of-service attacks.
B. Decentralization, as it concentrates the power of block production and transaction validation into a small, elected group of nodes.
C. Data availability, as the elected delegates are not required to store the entire history of the blockchain.
D. Open participation, as users must pay a high fee to become a delegate candidate.

57 In the context of distributed systems, how does an 'omission fault' differ from both a 'crash fault' and a 'Byzantine fault', and what specific challenges does it present?

Modeling faults and adversaries Hard
A. An omission fault is when a node selectively fails to send or receive some messages but otherwise functions correctly, making it harder to detect than a crashed node but less malicious than a Byzantine node.
B. An omission fault is identical to a Byzantine fault, but it only affects outgoing messages, not incoming ones.
C. An omission fault is a temporary crash fault from which the node can recover its previous state and continue operating.
D. An omission fault specifically refers to a node dropping messages due to network congestion, which is not considered a fault of the node itself.

58 The 'unspent transaction output' (UTXO) model used by Bitcoin is a core component of its design. How does the UTXO model fundamentally contribute to preventing double-spends in a decentralized environment?

Nakamoto’s concept with Blockchain based cryptocurrency Hard
A. It encrypts each UTXO with the owner's public key, preventing anyone else from creating a transaction that spends it.
B. It assigns a global, sequential serial number to each UTXO, and the consensus rules reject any transaction that attempts to spend a serial number that is already marked as spent.
C. It functions as an account-based system where the balance of each address is checked before a transaction is processed to ensure sufficient funds.
D. It forces every transaction to explicitly consume specific, existing UTXOs as inputs and create new ones as outputs, making it impossible to create a valid transaction that spends the same UTXO twice.

59 What is the relationship between a consensus algorithm that solves the Byzantine Generals Problem and one that is 'Byzantine Fault Tolerant' (BFT)?

Byzantine generals problem Hard
A. A BFT algorithm must solve the Byzantine Generals Problem
B. BFT is a specific algorithm (like PBFT), whereas the Byzantine Generals Problem is a class of hardware faults in distributed computing.
C. The Byzantine Generals Problem only applies to synchronous systems, while BFT algorithms are designed for asynchronous networks.
D. but it also must handle other network conditions like liveness (guaranteeing progress) in addition to safety (correctness).
E. MODIFIED_
F. They are effectively the same concept; a BFT algorithm is a practical, implementable solution to the abstract Byzantine Generals Problem.

60 Simplified Payment Verification (SPV) nodes in Bitcoin rely on Merkle proofs to verify transactions without downloading the entire blockchain. This efficiency comes with a security trade-off. What is the primary security risk an SPV node is exposed to that a full node is not?

Technologies Borrowed in Blockchain – hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. Hard
A. An SPV node could be tricked by a majority of miners into accepting a transaction that is part of a block on a shorter, invalid fork, without being aware that a longer, valid chain exists.
B. An SPV node can be fooled into accepting a block with an invalid transaction (e.g., creating coins from nothing) if it receives a valid Merkle proof for that transaction's inclusion in the block.
C. An SPV node's transactions can be stolen by a man-in-the-middle attack, whereas a full node's cannot.
D. An SPV node cannot verify if a transaction's inputs have been double-spent, as this requires the full UTXO set.