Unit 4 - Practice Quiz

CSC203 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the approximate target time for creating a new block in the Bitcoin blockchain?

Bitcoin blockchain Easy
A. 10 minutes
B. 1 second
C. 1 hour
D. 1 minute

2 What is the very first block in the Bitcoin blockchain commonly called?

Bitcoin blockchain Easy
A. The Final Block
B. The Alpha Block
C. The Genesis Block
D. The Prime Block

3 Who is the pseudonymous creator or group of creators of Bitcoin?

Bitcoin blockchain Easy
A. Charles Hoskinson
B. Satoshi Nakamoto
C. Hal Finney
D. Vitalik Buterin

4 How are blocks in the Bitcoin blockchain cryptographically connected to form a chain?

Bitcoin blockchain Easy
A. Each block contains the private key of the previous block.
B. Each block contains a direct memory pointer to the previous one.
C. Each block is signed by a central server.
D. Each block contains the hash of the previous block.

5 In the context of digital currencies, what does the 'double-spending' problem refer to?

Challenges and solutions Easy
A. A bug that doubles a user's wallet balance.
B. Paying twice the price for a single item.
C. Exchanging one cryptocurrency for another twice.
D. A user successfully spending the same digital money more than once.

6 What is a '51% attack' on a Proof of Work blockchain like Bitcoin?

Challenges and solutions Easy
A. A software bug that affects 51% of the network nodes.
B. A situation where a single entity controls more than 50% of the network's mining power.
C. A social engineering attack targeting 51% of users.
D. An attack that steals 51% of all Bitcoins in circulation.

7 How does the Bitcoin network's difficulty adjustment feature work as a solution?

Challenges and solutions Easy
A. It changes the block reward for miners.
B. It aims to keep the block creation time at approximately 10 minutes.
C. It deletes old transactions from the blockchain to save space.
D. It makes transactions more expensive.

8 What is the primary role of the Proof of Work (PoW) consensus algorithm in Bitcoin?

Proof of work Easy
A. To encrypt user wallets.
B. To speed up transaction processing to millions per second.
C. To create new Bitcoin out of thin air.
D. To secure the network and achieve consensus on the valid transaction ledger.

9 The process of performing the computations for Bitcoin's Proof of Work is commonly called what?

Proof of work Easy
A. Staking
B. Forging
C. Validating
D. Mining

10 What cryptographic hash algorithm is central to Bitcoin's Proof of Work?

Proof of work Easy
A. Scrypt
B. MD5
C. SHA-1
D. SHA-256

11 What do miners receive as a reward for successfully creating a new block in Bitcoin?

Proof of work Easy
A. Newly created bitcoins (block reward) and transaction fees.
B. Voting rights in the network's governance.
C. Interest on the bitcoins they hold.
D. A certificate of appreciation.

12 In a Proof of Stake (PoS) system, what is the primary factor that determines a user's chance of creating the next block?

Proof of stake Easy
A. The age of their account on the network.
B. The speed of their computer.
C. The number of transactions they have sent.
D. The amount of cryptocurrency they hold and are willing to 'stake'.

13 A major advantage of Proof of Stake (PoS) when compared to Proof of Work (PoW) is that it is significantly more...

Proof of stake Easy
A. Time-tested and established
B. Complex to implement
C. Energy-efficient
D. Decentralized

14 What is the process of creating new blocks often called in a Proof of Stake system?

Proof of stake Easy
A. Mining or Hashing
B. Signing or Authorizing
C. Forging or Minting
D. Printing or Coding

15 In Delegated Proof of Stake (DPoS), how are the block producers (validators) chosen?

Alternatives to Bitcoin consensus Easy
A. They are elected by other coin holders through a voting system.
B. They are appointed by the network's founding developers.
C. They are the wealthiest coin holders.
D. They are chosen randomly by the protocol.

16 Which type of consensus algorithm is generally best suited for private or permissioned blockchains where participants are known?

Alternatives to Bitcoin consensus Easy
A. Practical Byzantine Fault Tolerance (PBFT)
B. Proof of Burn (PoB)
C. Proof of Work (PoW)
D. Proof of Capacity (PoC)

17 Proof of Authority (PoA) is a consensus mechanism where block validators are chosen based on their...

Alternatives to Bitcoin consensus Easy
A. Computational power
B. Amount of staked coins
C. Age on the network
D. Established reputation and identity

18 What is the name of the built-in, stack-based scripting language of Bitcoin?

Bitcoin scripting language and their use Easy
A. C++
B. Solidity
C. Script
D. Javascript

19 Why is Bitcoin's scripting language intentionally designed to be non-Turing-complete?

Bitcoin scripting language and their use Easy
A. To make it faster than other languages.
B. To make it easier for new programmers to learn.
C. To reduce the potential for bugs and prevent infinite loops.
D. To allow for more complex smart contracts, like those on Ethereum.

20 A multi-signature (multisig) wallet, which requires M-of-N signatures to spend funds, is a feature enabled by what component of Bitcoin?

Bitcoin scripting language and their use Easy
A. The fixed supply of 21 million coins
B. The Bitcoin scripting language
C. The Proof of Work algorithm
D. The peer-to-peer network structure

21 A user sends 1 BTC from an address that holds a single UTXO of 3 BTC to a new address. Assuming a 0.001 BTC transaction fee, how is the UTXO set updated after this transaction is confirmed in a block?

Bitcoin blockchain Medium
A. The 3 BTC UTXO is consumed, and two new UTXOs are created: one for 1 BTC (to the recipient) and one for 1.999 BTC (as change to the sender).
B. The original 3 BTC UTXO is updated to a value of 1.999 BTC, and a new 1 BTC UTXO is created for the recipient.
C. The 3 BTC UTXO is consumed, and three new UTXOs are created: 1 BTC for the recipient, 1.999 BTC for change, and 0.001 BTC for the miner.
D. The 3 BTC UTXO is consumed, and one new UTXO of 2.999 BTC is created for the sender's change address.

22 What is the primary security and efficiency advantage of using a Merkle root in the Bitcoin block header instead of including all individual transaction hashes directly?

Bitcoin blockchain Medium
A. It allows for transaction hashes to be compressed, saving space in the block.
B. It makes the block header's hash easier to calculate for miners.
C. It provides a way to order transactions chronologically within the block header.
D. It enables Simplified Payment Verification (SPV) clients to verify a transaction's inclusion without downloading the entire block.

23 The Bitcoin network difficulty is designed to adjust every 2016 blocks to target an average block time of 10 minutes. If, due to a massive increase in hash rate, the last 2016 blocks were mined in only 7 days, what would the network's response be?

Proof of work Medium
A. The block reward would be halved to slow down miners.
B. The network would temporarily halt to allow for manual adjustment.
C. The difficulty would decrease by approximately 50%.
D. The difficulty would increase by approximately 100%.

24 How did the Segregated Witness (SegWit) upgrade primarily address the issue of third-party transaction malleability in Bitcoin?

Challenges and solutions Medium
A. By increasing the network fee for any transaction that has been altered.
B. By requiring multiple signatures for every transaction, making alteration more difficult.
C. By encrypting the digital signature so it cannot be altered.
D. By moving the signature data (the "witness") from the main transaction body to a separate data structure, so it no longer affects the transaction ID (txid).

25 What is the "nothing-at-stake" problem in Proof of Stake consensus mechanisms, and why is it generally not an issue in Proof of Work?

Proof of stake Medium
A. Staked coins can be lost due to network errors, while PoW mining equipment is a physical asset.
B. PoS validators risk nothing if they propose an invalid block, unlike PoW miners who lose electricity costs.
C. In the event of a fork, a PoS validator can cheaply vote for both chains to maximize potential rewards, whereas a PoW miner must split their expensive hash power.
D. Validators have no incentive to validate transactions, whereas PoW miners are paid block rewards.

26 A Pay-to-Script-Hash (P2SH) transaction output is locked with a hash of a redeem script. What must the spender provide in the input's scriptSig to successfully unlock these funds?

Bitcoin scripting language and their use Medium
A. Just the digital signature corresponding to the public key.
B. The private key used to generate the address, which the network then uses to generate the redeem script.
C. A new script hash that matches the original one.
D. The full, unhashed redeem script and the data (e.g., signatures) that make that redeem script evaluate to true.

27 How does Delegated Proof of Stake (DPoS) attempt to solve the scalability and performance issues seen in Proof of Work, and what is the primary trade-off?

Alternatives to Bitcoin consensus Medium
A. It randomly selects a new block producer every 10 minutes from the entire pool of stakers, improving decentralization.
B. It uses a small, fixed number of elected block producers, allowing for faster block confirmation, at the cost of increased centralization.
C. It requires all coin holders to participate in block validation, which improves security but slows down the network.
D. It replaces mining with a lottery system, reducing energy consumption but making the network vulnerable to Sybil attacks.

28 A malicious actor gains control of 51% of the Bitcoin network's hash rate. Which of the following attacks could they successfully execute?

Challenges and solutions Medium
A. Create new bitcoins out of thin air, exceeding the 21 million supply limit.
B. Reverse any transaction on the blockchain, including one from several years ago.
C. Steal bitcoins from an address for which they do not possess the private key.
D. Spend their own bitcoins, wait for confirmation, and then create a fork to reverse that specific transaction, allowing them to double-spend the coins.

29 In the context of Bitcoin's PoW, what does it mean for the hash function (SHA-256) to be "puzzle-friendly"?

Proof of work Medium
A. Given a specific output range y, it is infeasible to find an input x such that H(x) falls in y by any method more efficient than random guessing.
B. The function is easy to compute in one direction but extremely difficult to reverse.
C. A small change in the input x results in a completely different, unpredictable output hash.
D. The output of the hash function is always a fixed length, regardless of the input size.

30 What is the primary reason for Bitcoin's scripting language (Script) being intentionally designed as non-Turing complete?

Bitcoin scripting language and their use Medium
A. To comply with international financial regulations that limit the complexity of smart contracts.
B. To reduce the computational power required by miners to run the scripts.
C. To make the language easier for new developers to learn.
D. To prevent infinite loops and ensure transaction validation is always predictable and finite, protecting the network from denial-of-service attacks.

31 In a Proof of Stake system that implements "slashing", what is the main purpose of this mechanism?

Proof of stake Medium
A. To create a strong economic disincentive for validators who act maliciously, such as by double-signing blocks.
B. To reward validators who have the longest uptime.
C. To reduce the total supply of the cryptocurrency over time.
D. To randomly select which validator's stake will be used for the next block reward.

32 What is the fundamental principle behind how the Lightning Network aims to solve Bitcoin's scalability problem?

Challenges and solutions Medium
A. By increasing Bitcoin's block size from 1MB to 8MB to accommodate more transactions.
B. By reducing the block time from 10 minutes to 1 minute, thereby increasing on-chain throughput.
C. By compressing transaction data on the main blockchain using a new algorithm like ZK-SNARKs.
D. By creating an off-chain, peer-to-peer layer of payment channels where multiple transactions can occur without being immediately broadcast to the main blockchain.

33 The block reward in Bitcoin is the primary incentive for miners. How do transaction fees contribute to the long-term security model of the Bitcoin network?

Proof of work Medium
A. Transaction fees are burned to reduce the total supply of Bitcoin.
B. Transaction fees are designed to eventually become the primary incentive for miners as the block reward subsidy diminishes to zero through periodic halvings.
C. Transaction fees are paid directly to full nodes for validating transactions, separate from the miners' block reward.
D. Transaction fees are used to speed up the difficulty adjustment process.

34 What is a key characteristic of consensus mechanisms like Practical Byzantine Fault Tolerance (PBFT) that makes them suitable for permissioned blockchains but less so for public ones like Bitcoin?

Alternatives to Bitcoin consensus Medium
A. PBFT allows anyone to become a validator without permission, which is insecure in a private setting.
B. PBFT relies on a known, and often small, set of validators, providing transaction finality but requiring participants to be identified.
C. PBFT consumes significantly more energy than Proof of Work, making it too expensive for public networks.
D. PBFT is probabilistic and never achieves absolute finality, making it unsuitable for enterprise use.

35 What is the role of the nLockTime parameter in a Bitcoin transaction?

Bitcoin blockchain Medium
A. It specifies the maximum amount of time a miner has to include the transaction in a block.
B. It defines a future time (as a block height or Unix timestamp) before which the transaction is invalid and cannot be included in a block.
C. It indicates the exact time the transaction was created, which is used to resolve transaction ordering conflicts.
D. It is a nonce used by the sender to prevent transaction replay attacks on other blockchains.

36 A standard Pay-to-Public-Key-Hash (P2PKH) transaction script is validated by concatenating the scriptSig and scriptPubKey and executing them. For a valid transaction, what should be the final state of the stack after execution?

Bitcoin scripting language and their use Medium
A. The stack should contain a single value that evaluates to TRUE (a non-zero number).
B. The stack should be empty.
C. The stack should contain the number 0.
D. The stack should contain the public key of the spender.

37 Which of the following describes the concept of "probabilistic finality" in Nakamoto Consensus (Proof of Work) as used by Bitcoin?

Alternatives to Bitcoin consensus Medium
A. Finality is determined by a vote among a committee of nodes, and the result is probabilistic.
B. The probability of a confirmed transaction being reversed decreases exponentially as more blocks are added on top of it, but never reaches absolute certainty.
C. A transaction is considered absolutely final the moment it is included in one block.
D. Transactions have a 50/50 chance of being reversed until they are at least 10 blocks deep.

38 The "selfish mining" attack is a strategy where a miner finds a block but keeps it private, attempting to mine a second block on top of their secret one. What is the primary goal of this strategy?

Challenges and solutions Medium
A. To steal bitcoins directly from other users' wallets.
B. To earn a disproportionately larger share of mining rewards than their hash rate would normally entitle them to, by selectively orphaning blocks from honest miners.
C. To reduce the overall network difficulty, making it easier to mine future blocks.
D. To shut down the entire Bitcoin network by creating an endless chain of orphaned blocks.

39 A miner is trying to find a valid block hash. The current target requires the block hash to start with 10 leading zeros. If the network difficulty increases significantly, what would be the most likely new target?

Proof of work Medium
A. A target requiring the hash to start with 12 leading zeros.
B. A target requiring the hash to contain the previous block's nonce.
C. A target requiring the hash to be an even number.
D. A target requiring the hash to start with 8 leading zeros.

40 In the context of the Unspent Transaction Output (UTXO) model, what primarily prevents a user from spending the same digital coin twice in two different unconfirmed transactions that are broadcast simultaneously?

Bitcoin blockchain Medium
A. The Bitcoin protocol limits each address to one broadcast transaction per minute.
B. The user's private key changes after each transaction is broadcast, invalidating the second transaction's signature.
C. Each coin is time-stamped, and only the earliest transaction is considered valid by the network.
D. Miners will typically only accept the first of the two conflicting transactions they see into their memory pool, and will reject the second as an invalid double-spend attempt.

41 A P2SH address funds a redeem script with the following logic: OP_IF <2 pubkeyA pubkeyB pubkeyC 3 OP_CHECKMULTISIG> OP_ELSE <NOW + 90 days> OP_CHECKLOCKTIMEVERIFY OP_DROP <pubkeyD> OP_CHECKSIG OP_ENDIF. What is the most precise description of the spending conditions for the funds locked in this script?

Bitcoin scripting language and their use Hard
A. The script is invalid because OP_CHECKLOCKTIMEVERIFY cannot be combined with OP_CHECKMULTISIG in the same redeem script.
B. A 2-of-3 multisignature from keys A, B, and C is required, AND the transaction must be signed by key D after a 90-day delay.
C. A 2-of-3 multisignature from keys A, B, or C can spend the funds immediately, OR a single signature from key D can spend the funds, but only in a transaction with an nLockTime set to at least 90 days in the future.
D. The funds can only be spent by a 2-of-3 multisignature from A, B, and C if a non-zero value is pushed to the stack, otherwise key D can spend them immediately.

42 A mining pool contributes 15% of the total network hashrate. The network difficulty is stable, resulting in an average block time of 10 minutes for the entire network. What is the approximate probability that this specific pool will find at least one block within the next 60 minutes?

Proof of work Hard
A. Approximately 59.4%
B. Exactly 60%
C. Approximately 15%
D. Exactly 90%

43 In the context of Bitcoin's privacy, what is the primary limitation of using a new address for every transaction (a core principle of wallet hygiene) in preventing deanonymization via transaction graph analysis?

Challenges and solutions Hard
A. It fails to break the 'common-input-ownership' heuristic, where multiple inputs to a single transaction are assumed to belong to the same entity.
B. It does not protect against analysis of transaction timing and value, which can still link activities.
C. It is computationally expensive and not supported by most modern wallet software.
D. It actually increases the on-chain footprint, making it easier for analysts to identify large entities.

44 Before the activation of Segregated Witness (SegWit), third-party transaction malleability was a significant issue. How could a third party (e.g., a node or miner) alter a transaction's hash (txid) without invalidating the ECDSA signature itself, and what was the main consequence for chained transactions?

Bitcoin blockchain Hard
A. By adding extra data to the coinbase transaction, which changed the Merkle root and thus the txid of every transaction in the block.
B. By changing the nLockTime field of the transaction, which is not signed, causing the txid to change and the transaction to be delayed.
C. By altering the scriptPubKey, which is not covered by the signature, thus changing the txid and redirecting the funds.
D. By using a different but cryptographically valid serialization for the signature (e.g., changing S to -S mod N), which changed the txid and broke the input reference for any unconfirmed child transaction.

45 The 'Nothing-at-Stake' problem in early Proof-of-Stake designs describes a scenario where validators are economically incentivized to validate on all competing forks, preventing consensus. How do modern PoS systems like Ethereum 2.0 primarily solve this problem?

Proof of stake Hard
A. By introducing 'slashing' conditions, where a validator's stake is destroyed if they are caught signing blocks for multiple competing chains at the same height.
B. By using a Delegated Proof of Stake (DPoS) model where only a small number of trusted validators can create blocks.
C. By requiring validators to solve a small proof-of-work puzzle for each block they produce.
D. By increasing block rewards to a level where the incentive to be honest on one chain outweighs the potential rewards from all other chains combined.

46 A Pay-to-Witness-Script-Hash (P2WSH) output is created for a 2-of-2 multisig script. How is this transaction's output script (scriptPubKey) represented on the Bitcoin blockchain, and what data must the spender provide in the transaction's witness field?

Bitcoin scripting language and their use Hard
A. The scriptPubKey is OP_HASH160 <20-byte-hash-of-script> OP_EQUAL. The spender provides the two signatures and the full redeem script in the scriptSig.
B. The scriptPubKey contains the full script: <2 pubkeyA pubkeyB 2 OP_CHECKMULTISIG>. The spender provides only the two signatures in the witness field.
C. The scriptPubKey is empty. The spender provides the two signatures, the two public keys, and the script hash in the witness field.
D. The scriptPubKey is OP_0 <32-byte-SHA256-hash-of-script>. The spender provides the two signatures followed by the full serialized redeem script in the witness field.

47 How does the concept of 'finality' in Bitcoin's Nakamoto Consensus (Proof-of-Work) fundamentally differ from finality in a classical consensus algorithm like Practical Byzantine Fault Tolerance (PBFT)?

Alternatives to Bitcoin consensus Hard
A. Both provide probabilistic finality, but Bitcoin's is based on economic incentives while PBFT's is based on cryptographic signatures.
B. Bitcoin provides absolute finality after 6 confirmations, while PBFT finality is always probabilistic.
C. Bitcoin provides probabilistic finality that grows stronger with each confirmation, whereas PBFT provides absolute (deterministic) finality once a round of voting is complete, assuming less than 1/3 of nodes are malicious.
D. Finality in Bitcoin is achieved when a block is broadcast, while in PBFT it is achieved only after a supermajority of nodes have mined a subsequent block.

48 The Bitcoin difficulty adjustment algorithm retargets every 2016 blocks. If a sudden and sustained 40% decrease in network hashrate occurs immediately following a difficulty adjustment, what will be the approximate average block time during the next 2016-block epoch?

Proof of work Hard
A. 10 minutes
B. 6 minutes
C. 14 minutes
D. 16.67 minutes

49 In the Bitcoin Lightning Network, what is the primary role of the to_self_delay parameter in the script of a commitment transaction output, and why is it crucial for the security of a cheating party's funds?

Challenges and solutions Hard
A. It sets the expiration date for the entire payment channel, after which all funds are returned to their original owners.
B. It forces the cheating party to wait for a specified period before they can claim their own funds from a broadcasted old state, giving the other party a window to broadcast a penalty transaction.
C. It defines the maximum amount of time a payment (HTLC) can be in transit before it is automatically cancelled.
D. It is a network-wide constant that prevents transactions from being confirmed too quickly, reducing the risk of chain re-organizations.

50 A Bitcoin block header contains a Merkle Root, which is a hash of all transactions in the block. If an attacker could find a SHA-256 collision (i.e., two different transaction datasets T1 and T2 where HASH256(T1) = HASH256(T2)), how could they exploit this to defraud a user?

Bitcoin blockchain Hard
A. They could create a block that is valid for both T1 and T2, show the user a block explorer confirming T1 (a payment to the user), but broadcast the block containing T2 (a payment to the attacker) to the network.
B. They could use the collision to create a single transaction that appears to pay two different addresses with the same funds.
C. They could mine a block much faster because finding the collision reduces the nonce search space.
D. This is a purely theoretical attack because the double-SHA256 (HASH256) used for txids is fundamentally immune to collision attacks, unlike single-SHA256.

51 A 'long-range attack' is a specific vulnerability in Proof-of-Stake systems. It is most effective against which type of network participant?

Proof of stake Hard
A. New nodes that are syncing the blockchain for the first time or nodes that have been offline for an extended period.
B. Miners who are switching from a Proof-of-Work chain to a Proof-of-Stake chain.
C. Exchanges and large custodians who process a high volume of transactions.
D. Existing, fully-synced validators who have been online for a long time.

52 The Taproot upgrade introduces Pay-to-Taproot (P2TR) outputs. In the case of a 'script-path spend', where one of the complex spending conditions from the Merkle tree is used, what must be included in the witness data in addition to the inputs required by the script itself?

Bitcoin scripting language and their use Hard
A. The entire Merkle tree, containing all possible spending scripts.
B. The specific script being executed, along with a Merkle proof (the branch of hashes) connecting that script's hash to the Merkle root that is committed to in the Taproot output.
C. The full public key of every potential participant in all possible script paths.
D. A signature from the 'internal key' proving that the key-path spend was not possible.

53 In a 'selfish mining' attack, a mining pool with hashrate keeps its discovered blocks private. What is the primary game-theoretic reason this strategy can be more profitable than honest mining for ?

Proof of work Hard
A. By keeping blocks secret, the selfish miner solves them at a lower difficulty, as the public network difficulty has not yet adjusted to their hashrate.
B. The selfish miner earns higher transaction fees by exclusively including high-fee transactions in their secret blocks.
C. By strategically releasing their blocks, they can create forks and orphan blocks found by the honest majority, causing the honest miners' effective hashrate to be wasted and increasing the selfish miner's relative share of rewards.
D. The selfish miner can perform double-spends in every secret block they mine, which is more profitable than the block reward.

54 The coinbase transaction in a Bitcoin block has a unique rule: its outputs cannot be spent for 100 blocks. What is the primary security rationale behind this 'coinbase maturity' rule?

Bitcoin blockchain Hard
A. To act as a mandatory staking period, forcing miners to have a long-term interest in the network's health.
B. To prevent inflation by time-locking newly created bitcoin, ensuring a stable money supply.
C. To mitigate the economic instability of a deep chain reorganization; it ensures that a miner cannot spend a block reward from a block that is later orphaned.
D. To give the network time to verify the miner's identity and ensure they are not a malicious actor.

55 Delegated Proof of Stake (DPoS) systems, like EOS, achieve high throughput by limiting block production to a small, elected set of 'witnesses' or 'block producers'. What is the most significant centralization risk inherent in this design?

Alternatives to Bitcoin consensus Hard
A. DPoS is more vulnerable to 51% attacks than PoW because it is cheaper to buy votes than to acquire equivalent hashrate.
B. The small number of elected producers can form cartels to censor transactions, extract rent (e.g., through MEV), or collude to maintain their elected positions, reducing the system's permissionlessness and censorship resistance.
C. The high cost of server hardware required to be a block producer centralizes power among the wealthy.
D. The voting process is susceptible to low voter turnout, leading to a system that does not reflect the will of the majority of token holders.

56 From a privacy and efficiency standpoint, what is the primary advantage of transaction 'batching' as practiced by large exchanges?

Challenges and solutions Hard
A. It obscures the total amount of funds held by the exchange by breaking down large UTXOs into thousands of smaller ones.
B. It perfectly anonymizes the sender by mixing their inputs with those of many other users, similar to a CoinJoin.
C. It reduces the total blockchain space required per payment by combining many logical payments into one transaction, thus lowering the aggregate transaction fees for the exchange.
D. It increases the number of confirmations required for a payment to be considered final, enhancing security.

57 The Bitcoin network difficulty target is a 256-bit number . A valid block hash must satisfy the condition . The maximum possible hash value is . What is the precise expected number of hashes required to find one valid block?

Proof of work Hard
A.
B.
C.
D. Difficulty, where Difficulty =

58 Consider this Bitcoin script: OP_SIZE <32> OP_EQUALVERIFY OP_SHA256 <expected_hash> OP_EQUAL. What is this script demanding from the spender in order to unlock the funds?

Bitcoin scripting language and their use Hard
A. A digital signature that is exactly 32 bytes long and matches the public key hash.
B. Two numbers that when added together equal 32, and their hash matches <expected_hash>.
C. A piece of data that, when hashed with SHA256, results in <expected_hash>, and the data itself must be exactly 32 bytes long.
D. Any piece of data that is exactly 32 bytes long.

59 A user creates a transaction with an nLockTime set to a future block height (e.g., 800,000) and all its input nSequence numbers set to 0xFFFFFFFF. What is the status of this transaction?

Bitcoin blockchain Hard
A. The transaction is valid but can only be included in block 800,000 and no other block.
B. The transaction is valid and can be included in any block immediately, as the nSequence value disables the nLockTime feature for this transaction.
C. The transaction is invalid and will be rejected by all nodes.
D. The transaction is held in the mempool by nodes but will not be included in a block until block 800,000 is mined.

60 In a Proof-of-Stake system using a Verifiable Random Function (VRF) for leader election, what is the primary security advantage this method provides over a publicly predictable algorithm (e.g., one based on the hash of the last block)?

Proof of stake Hard
A. It is significantly more computationally efficient, reducing the carbon footprint of the network.
B. It allows a validator to prove they were chosen legitimately without revealing in advance who the next validator would be, thus mitigating targeted DDoS attacks.
C. It ensures that stakers with more stake have a proportionally higher chance of being selected.
D. It prevents validators from manipulating the block data to increase their own chances of being selected in the next round.