Unit 4 - Practice Quiz

CSC203 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the approximate target time for creating a new block in the Bitcoin blockchain?

Bitcoin blockchain Easy
A. 1 minute
B. 10 minutes
C. 1 second
D. 1 hour

2 What is the very first block in the Bitcoin blockchain commonly called?

Bitcoin blockchain Easy
A. The Genesis Block
B. The Alpha Block
C. The Final Block
D. The Prime Block

3 Who is the pseudonymous creator or group of creators of Bitcoin?

Bitcoin blockchain Easy
A. Vitalik Buterin
B. Hal Finney
C. Charles Hoskinson
D. Satoshi Nakamoto

4 How are blocks in the Bitcoin blockchain cryptographically connected to form a chain?

Bitcoin blockchain Easy
A. Each block contains the private key of the previous block.
B. Each block contains a direct memory pointer to the previous one.
C. Each block contains the hash of the previous block.
D. Each block is signed by a central server.

5 In the context of digital currencies, what does the 'double-spending' problem refer to?

Challenges and solutions Easy
A. Paying twice the price for a single item.
B. A user successfully spending the same digital money more than once.
C. A bug that doubles a user's wallet balance.
D. Exchanging one cryptocurrency for another twice.

6 What is a '51% attack' on a Proof of Work blockchain like Bitcoin?

Challenges and solutions Easy
A. A social engineering attack targeting 51% of users.
B. A situation where a single entity controls more than 50% of the network's mining power.
C. An attack that steals 51% of all Bitcoins in circulation.
D. A software bug that affects 51% of the network nodes.

7 How does the Bitcoin network's difficulty adjustment feature work as a solution?

Challenges and solutions Easy
A. It aims to keep the block creation time at approximately 10 minutes.
B. It changes the block reward for miners.
C. It deletes old transactions from the blockchain to save space.
D. It makes transactions more expensive.

8 What is the primary role of the Proof of Work (PoW) consensus algorithm in Bitcoin?

Proof of work Easy
A. To create new Bitcoin out of thin air.
B. To speed up transaction processing to millions per second.
C. To secure the network and achieve consensus on the valid transaction ledger.
D. To encrypt user wallets.

9 The process of performing the computations for Bitcoin's Proof of Work is commonly called what?

Proof of work Easy
A. Mining
B. Staking
C. Forging
D. Validating

10 What cryptographic hash algorithm is central to Bitcoin's Proof of Work?

Proof of work Easy
A. SHA-256
B. MD5
C. Scrypt
D. SHA-1

11 What do miners receive as a reward for successfully creating a new block in Bitcoin?

Proof of work Easy
A. Interest on the bitcoins they hold.
B. A certificate of appreciation.
C. Newly created bitcoins (block reward) and transaction fees.
D. Voting rights in the network's governance.

12 In a Proof of Stake (PoS) system, what is the primary factor that determines a user's chance of creating the next block?

Proof of stake Easy
A. The age of their account on the network.
B. The amount of cryptocurrency they hold and are willing to 'stake'.
C. The speed of their computer.
D. The number of transactions they have sent.

13 A major advantage of Proof of Stake (PoS) when compared to Proof of Work (PoW) is that it is significantly more...

Proof of stake Easy
A. Complex to implement
B. Time-tested and established
C. Decentralized
D. Energy-efficient

14 What is the process of creating new blocks often called in a Proof of Stake system?

Proof of stake Easy
A. Signing or Authorizing
B. Printing or Coding
C. Forging or Minting
D. Mining or Hashing

15 In Delegated Proof of Stake (DPoS), how are the block producers (validators) chosen?

Alternatives to Bitcoin consensus Easy
A. They are appointed by the network's founding developers.
B. They are the wealthiest coin holders.
C. They are chosen randomly by the protocol.
D. They are elected by other coin holders through a voting system.

16 Which type of consensus algorithm is generally best suited for private or permissioned blockchains where participants are known?

Alternatives to Bitcoin consensus Easy
A. Proof of Work (PoW)
B. Proof of Burn (PoB)
C. Practical Byzantine Fault Tolerance (PBFT)
D. Proof of Capacity (PoC)

17 Proof of Authority (PoA) is a consensus mechanism where block validators are chosen based on their...

Alternatives to Bitcoin consensus Easy
A. Established reputation and identity
B. Computational power
C. Age on the network
D. Amount of staked coins

18 What is the name of the built-in, stack-based scripting language of Bitcoin?

Bitcoin scripting language and their use Easy
A. Script
B. C++
C. Solidity
D. Javascript

19 Why is Bitcoin's scripting language intentionally designed to be non-Turing-complete?

Bitcoin scripting language and their use Easy
A. To reduce the potential for bugs and prevent infinite loops.
B. To make it easier for new programmers to learn.
C. To allow for more complex smart contracts, like those on Ethereum.
D. To make it faster than other languages.

20 A multi-signature (multisig) wallet, which requires M-of-N signatures to spend funds, is a feature enabled by what component of Bitcoin?

Bitcoin scripting language and their use Easy
A. The peer-to-peer network structure
B. The Bitcoin scripting language
C. The Proof of Work algorithm
D. The fixed supply of 21 million coins

21 A user sends 1 BTC from an address that holds a single UTXO of 3 BTC to a new address. Assuming a 0.001 BTC transaction fee, how is the UTXO set updated after this transaction is confirmed in a block?

Bitcoin blockchain Medium
A. The 3 BTC UTXO is consumed, and two new UTXOs are created: one for 1 BTC (to the recipient) and one for 1.999 BTC (as change to the sender).
B. The original 3 BTC UTXO is updated to a value of 1.999 BTC, and a new 1 BTC UTXO is created for the recipient.
C. The 3 BTC UTXO is consumed, and three new UTXOs are created: 1 BTC for the recipient, 1.999 BTC for change, and 0.001 BTC for the miner.
D. The 3 BTC UTXO is consumed, and one new UTXO of 2.999 BTC is created for the sender's change address.

22 What is the primary security and efficiency advantage of using a Merkle root in the Bitcoin block header instead of including all individual transaction hashes directly?

Bitcoin blockchain Medium
A. It makes the block header's hash easier to calculate for miners.
B. It allows for transaction hashes to be compressed, saving space in the block.
C. It provides a way to order transactions chronologically within the block header.
D. It enables Simplified Payment Verification (SPV) clients to verify a transaction's inclusion without downloading the entire block.

23 The Bitcoin network difficulty is designed to adjust every 2016 blocks to target an average block time of 10 minutes. If, due to a massive increase in hash rate, the last 2016 blocks were mined in only 7 days, what would the network's response be?

Proof of work Medium
A. The block reward would be halved to slow down miners.
B. The network would temporarily halt to allow for manual adjustment.
C. The difficulty would decrease by approximately 50%.
D. The difficulty would increase by approximately 100%.

24 How did the Segregated Witness (SegWit) upgrade primarily address the issue of third-party transaction malleability in Bitcoin?

Challenges and solutions Medium
A. By moving the signature data (the "witness") from the main transaction body to a separate data structure, so it no longer affects the transaction ID (txid).
B. By encrypting the digital signature so it cannot be altered.
C. By requiring multiple signatures for every transaction, making alteration more difficult.
D. By increasing the network fee for any transaction that has been altered.

25 What is the "nothing-at-stake" problem in Proof of Stake consensus mechanisms, and why is it generally not an issue in Proof of Work?

Proof of stake Medium
A. PoS validators risk nothing if they propose an invalid block, unlike PoW miners who lose electricity costs.
B. Validators have no incentive to validate transactions, whereas PoW miners are paid block rewards.
C. In the event of a fork, a PoS validator can cheaply vote for both chains to maximize potential rewards, whereas a PoW miner must split their expensive hash power.
D. Staked coins can be lost due to network errors, while PoW mining equipment is a physical asset.

26 A Pay-to-Script-Hash (P2SH) transaction output is locked with a hash of a redeem script. What must the spender provide in the input's scriptSig to successfully unlock these funds?

Bitcoin scripting language and their use Medium
A. The full, unhashed redeem script and the data (e.g., signatures) that make that redeem script evaluate to true.
B. A new script hash that matches the original one.
C. Just the digital signature corresponding to the public key.
D. The private key used to generate the address, which the network then uses to generate the redeem script.

27 How does Delegated Proof of Stake (DPoS) attempt to solve the scalability and performance issues seen in Proof of Work, and what is the primary trade-off?

Alternatives to Bitcoin consensus Medium
A. It requires all coin holders to participate in block validation, which improves security but slows down the network.
B. It replaces mining with a lottery system, reducing energy consumption but making the network vulnerable to Sybil attacks.
C. It randomly selects a new block producer every 10 minutes from the entire pool of stakers, improving decentralization.
D. It uses a small, fixed number of elected block producers, allowing for faster block confirmation, at the cost of increased centralization.

28 A malicious actor gains control of 51% of the Bitcoin network's hash rate. Which of the following attacks could they successfully execute?

Challenges and solutions Medium
A. Steal bitcoins from an address for which they do not possess the private key.
B. Reverse any transaction on the blockchain, including one from several years ago.
C. Create new bitcoins out of thin air, exceeding the 21 million supply limit.
D. Spend their own bitcoins, wait for confirmation, and then create a fork to reverse that specific transaction, allowing them to double-spend the coins.

29 In the context of Bitcoin's PoW, what does it mean for the hash function (SHA-256) to be "puzzle-friendly"?

Proof of work Medium
A. The function is easy to compute in one direction but extremely difficult to reverse.
B. A small change in the input x results in a completely different, unpredictable output hash.
C. Given a specific output range y, it is infeasible to find an input x such that H(x) falls in y by any method more efficient than random guessing.
D. The output of the hash function is always a fixed length, regardless of the input size.

30 What is the primary reason for Bitcoin's scripting language (Script) being intentionally designed as non-Turing complete?

Bitcoin scripting language and their use Medium
A. To reduce the computational power required by miners to run the scripts.
B. To comply with international financial regulations that limit the complexity of smart contracts.
C. To prevent infinite loops and ensure transaction validation is always predictable and finite, protecting the network from denial-of-service attacks.
D. To make the language easier for new developers to learn.

31 In a Proof of Stake system that implements "slashing", what is the main purpose of this mechanism?

Proof of stake Medium
A. To create a strong economic disincentive for validators who act maliciously, such as by double-signing blocks.
B. To reward validators who have the longest uptime.
C. To reduce the total supply of the cryptocurrency over time.
D. To randomly select which validator's stake will be used for the next block reward.

32 What is the fundamental principle behind how the Lightning Network aims to solve Bitcoin's scalability problem?

Challenges and solutions Medium
A. By compressing transaction data on the main blockchain using a new algorithm like ZK-SNARKs.
B. By creating an off-chain, peer-to-peer layer of payment channels where multiple transactions can occur without being immediately broadcast to the main blockchain.
C. By reducing the block time from 10 minutes to 1 minute, thereby increasing on-chain throughput.
D. By increasing Bitcoin's block size from 1MB to 8MB to accommodate more transactions.

33 The block reward in Bitcoin is the primary incentive for miners. How do transaction fees contribute to the long-term security model of the Bitcoin network?

Proof of work Medium
A. Transaction fees are used to speed up the difficulty adjustment process.
B. Transaction fees are designed to eventually become the primary incentive for miners as the block reward subsidy diminishes to zero through periodic halvings.
C. Transaction fees are paid directly to full nodes for validating transactions, separate from the miners' block reward.
D. Transaction fees are burned to reduce the total supply of Bitcoin.

34 What is a key characteristic of consensus mechanisms like Practical Byzantine Fault Tolerance (PBFT) that makes them suitable for permissioned blockchains but less so for public ones like Bitcoin?

Alternatives to Bitcoin consensus Medium
A. PBFT is probabilistic and never achieves absolute finality, making it unsuitable for enterprise use.
B. PBFT consumes significantly more energy than Proof of Work, making it too expensive for public networks.
C. PBFT relies on a known, and often small, set of validators, providing transaction finality but requiring participants to be identified.
D. PBFT allows anyone to become a validator without permission, which is insecure in a private setting.

35 What is the role of the nLockTime parameter in a Bitcoin transaction?

Bitcoin blockchain Medium
A. It defines a future time (as a block height or Unix timestamp) before which the transaction is invalid and cannot be included in a block.
B. It is a nonce used by the sender to prevent transaction replay attacks on other blockchains.
C. It indicates the exact time the transaction was created, which is used to resolve transaction ordering conflicts.
D. It specifies the maximum amount of time a miner has to include the transaction in a block.

36 A standard Pay-to-Public-Key-Hash (P2PKH) transaction script is validated by concatenating the scriptSig and scriptPubKey and executing them. For a valid transaction, what should be the final state of the stack after execution?

Bitcoin scripting language and their use Medium
A. The stack should be empty.
B. The stack should contain the public key of the spender.
C. The stack should contain a single value that evaluates to TRUE (a non-zero number).
D. The stack should contain the number 0.

37 Which of the following describes the concept of "probabilistic finality" in Nakamoto Consensus (Proof of Work) as used by Bitcoin?

Alternatives to Bitcoin consensus Medium
A. Finality is determined by a vote among a committee of nodes, and the result is probabilistic.
B. Transactions have a 50/50 chance of being reversed until they are at least 10 blocks deep.
C. The probability of a confirmed transaction being reversed decreases exponentially as more blocks are added on top of it, but never reaches absolute certainty.
D. A transaction is considered absolutely final the moment it is included in one block.

38 The "selfish mining" attack is a strategy where a miner finds a block but keeps it private, attempting to mine a second block on top of their secret one. What is the primary goal of this strategy?

Challenges and solutions Medium
A. To steal bitcoins directly from other users' wallets.
B. To earn a disproportionately larger share of mining rewards than their hash rate would normally entitle them to, by selectively orphaning blocks from honest miners.
C. To shut down the entire Bitcoin network by creating an endless chain of orphaned blocks.
D. To reduce the overall network difficulty, making it easier to mine future blocks.

39 A miner is trying to find a valid block hash. The current target requires the block hash to start with 10 leading zeros. If the network difficulty increases significantly, what would be the most likely new target?

Proof of work Medium
A. A target requiring the hash to be an even number.
B. A target requiring the hash to start with 8 leading zeros.
C. A target requiring the hash to contain the previous block's nonce.
D. A target requiring the hash to start with 12 leading zeros.

40 In the context of the Unspent Transaction Output (UTXO) model, what primarily prevents a user from spending the same digital coin twice in two different unconfirmed transactions that are broadcast simultaneously?

Bitcoin blockchain Medium
A. The Bitcoin protocol limits each address to one broadcast transaction per minute.
B. Each coin is time-stamped, and only the earliest transaction is considered valid by the network.
C. Miners will typically only accept the first of the two conflicting transactions they see into their memory pool, and will reject the second as an invalid double-spend attempt.
D. The user's private key changes after each transaction is broadcast, invalidating the second transaction's signature.

41 A P2SH address funds a redeem script with the following logic: OP_IF <2 pubkeyA pubkeyB pubkeyC 3 OP_CHECKMULTISIG> OP_ELSE <NOW + 90 days> OP_CHECKLOCKTIMEVERIFY OP_DROP <pubkeyD> OP_CHECKSIG OP_ENDIF. What is the most precise description of the spending conditions for the funds locked in this script?

Bitcoin scripting language and their use Hard
A. The funds can only be spent by a 2-of-3 multisignature from A, B, and C if a non-zero value is pushed to the stack, otherwise key D can spend them immediately.
B. A 2-of-3 multisignature from keys A, B, or C can spend the funds immediately, OR a single signature from key D can spend the funds, but only in a transaction with an nLockTime set to at least 90 days in the future.
C. A 2-of-3 multisignature from keys A, B, and C is required, AND the transaction must be signed by key D after a 90-day delay.
D. The script is invalid because OP_CHECKLOCKTIMEVERIFY cannot be combined with OP_CHECKMULTISIG in the same redeem script.

42 A mining pool contributes 15% of the total network hashrate. The network difficulty is stable, resulting in an average block time of 10 minutes for the entire network. What is the approximate probability that this specific pool will find at least one block within the next 60 minutes?

Proof of work Hard
A. Exactly 60%
B. Exactly 90%
C. Approximately 15%
D. Approximately 59.4%

43 In the context of Bitcoin's privacy, what is the primary limitation of using a new address for every transaction (a core principle of wallet hygiene) in preventing deanonymization via transaction graph analysis?

Challenges and solutions Hard
A. It is computationally expensive and not supported by most modern wallet software.
B. It actually increases the on-chain footprint, making it easier for analysts to identify large entities.
C. It fails to break the 'common-input-ownership' heuristic, where multiple inputs to a single transaction are assumed to belong to the same entity.
D. It does not protect against analysis of transaction timing and value, which can still link activities.

44 Before the activation of Segregated Witness (SegWit), third-party transaction malleability was a significant issue. How could a third party (e.g., a node or miner) alter a transaction's hash (txid) without invalidating the ECDSA signature itself, and what was the main consequence for chained transactions?

Bitcoin blockchain Hard
A. By altering the scriptPubKey, which is not covered by the signature, thus changing the txid and redirecting the funds.
B. By adding extra data to the coinbase transaction, which changed the Merkle root and thus the txid of every transaction in the block.
C. By using a different but cryptographically valid serialization for the signature (e.g., changing S to -S mod N), which changed the txid and broke the input reference for any unconfirmed child transaction.
D. By changing the nLockTime field of the transaction, which is not signed, causing the txid to change and the transaction to be delayed.

45 The 'Nothing-at-Stake' problem in early Proof-of-Stake designs describes a scenario where validators are economically incentivized to validate on all competing forks, preventing consensus. How do modern PoS systems like Ethereum 2.0 primarily solve this problem?

Proof of stake Hard
A. By increasing block rewards to a level where the incentive to be honest on one chain outweighs the potential rewards from all other chains combined.
B. By introducing 'slashing' conditions, where a validator's stake is destroyed if they are caught signing blocks for multiple competing chains at the same height.
C. By using a Delegated Proof of Stake (DPoS) model where only a small number of trusted validators can create blocks.
D. By requiring validators to solve a small proof-of-work puzzle for each block they produce.

46 A Pay-to-Witness-Script-Hash (P2WSH) output is created for a 2-of-2 multisig script. How is this transaction's output script (scriptPubKey) represented on the Bitcoin blockchain, and what data must the spender provide in the transaction's witness field?

Bitcoin scripting language and their use Hard
A. The scriptPubKey is empty. The spender provides the two signatures, the two public keys, and the script hash in the witness field.
B. The scriptPubKey is OP_HASH160 <20-byte-hash-of-script> OP_EQUAL. The spender provides the two signatures and the full redeem script in the scriptSig.
C. The scriptPubKey contains the full script: <2 pubkeyA pubkeyB 2 OP_CHECKMULTISIG>. The spender provides only the two signatures in the witness field.
D. The scriptPubKey is OP_0 <32-byte-SHA256-hash-of-script>. The spender provides the two signatures followed by the full serialized redeem script in the witness field.

47 How does the concept of 'finality' in Bitcoin's Nakamoto Consensus (Proof-of-Work) fundamentally differ from finality in a classical consensus algorithm like Practical Byzantine Fault Tolerance (PBFT)?

Alternatives to Bitcoin consensus Hard
A. Both provide probabilistic finality, but Bitcoin's is based on economic incentives while PBFT's is based on cryptographic signatures.
B. Bitcoin provides probabilistic finality that grows stronger with each confirmation, whereas PBFT provides absolute (deterministic) finality once a round of voting is complete, assuming less than 1/3 of nodes are malicious.
C. Finality in Bitcoin is achieved when a block is broadcast, while in PBFT it is achieved only after a supermajority of nodes have mined a subsequent block.
D. Bitcoin provides absolute finality after 6 confirmations, while PBFT finality is always probabilistic.

48 The Bitcoin difficulty adjustment algorithm retargets every 2016 blocks. If a sudden and sustained 40% decrease in network hashrate occurs immediately following a difficulty adjustment, what will be the approximate average block time during the next 2016-block epoch?

Proof of work Hard
A. 10 minutes
B. 6 minutes
C. 14 minutes
D. 16.67 minutes

49 In the Bitcoin Lightning Network, what is the primary role of the to_self_delay parameter in the script of a commitment transaction output, and why is it crucial for the security of a cheating party's funds?

Challenges and solutions Hard
A. It sets the expiration date for the entire payment channel, after which all funds are returned to their original owners.
B. It defines the maximum amount of time a payment (HTLC) can be in transit before it is automatically cancelled.
C. It is a network-wide constant that prevents transactions from being confirmed too quickly, reducing the risk of chain re-organizations.
D. It forces the cheating party to wait for a specified period before they can claim their own funds from a broadcasted old state, giving the other party a window to broadcast a penalty transaction.

50 A Bitcoin block header contains a Merkle Root, which is a hash of all transactions in the block. If an attacker could find a SHA-256 collision (i.e., two different transaction datasets T1 and T2 where HASH256(T1) = HASH256(T2)), how could they exploit this to defraud a user?

Bitcoin blockchain Hard
A. They could create a block that is valid for both T1 and T2, show the user a block explorer confirming T1 (a payment to the user), but broadcast the block containing T2 (a payment to the attacker) to the network.
B. They could mine a block much faster because finding the collision reduces the nonce search space.
C. This is a purely theoretical attack because the double-SHA256 (HASH256) used for txids is fundamentally immune to collision attacks, unlike single-SHA256.
D. They could use the collision to create a single transaction that appears to pay two different addresses with the same funds.

51 A 'long-range attack' is a specific vulnerability in Proof-of-Stake systems. It is most effective against which type of network participant?

Proof of stake Hard
A. New nodes that are syncing the blockchain for the first time or nodes that have been offline for an extended period.
B. Exchanges and large custodians who process a high volume of transactions.
C. Existing, fully-synced validators who have been online for a long time.
D. Miners who are switching from a Proof-of-Work chain to a Proof-of-Stake chain.

52 The Taproot upgrade introduces Pay-to-Taproot (P2TR) outputs. In the case of a 'script-path spend', where one of the complex spending conditions from the Merkle tree is used, what must be included in the witness data in addition to the inputs required by the script itself?

Bitcoin scripting language and their use Hard
A. The entire Merkle tree, containing all possible spending scripts.
B. A signature from the 'internal key' proving that the key-path spend was not possible.
C. The full public key of every potential participant in all possible script paths.
D. The specific script being executed, along with a Merkle proof (the branch of hashes) connecting that script's hash to the Merkle root that is committed to in the Taproot output.

53 In a 'selfish mining' attack, a mining pool with hashrate keeps its discovered blocks private. What is the primary game-theoretic reason this strategy can be more profitable than honest mining for ?

Proof of work Hard
A. By keeping blocks secret, the selfish miner solves them at a lower difficulty, as the public network difficulty has not yet adjusted to their hashrate.
B. The selfish miner earns higher transaction fees by exclusively including high-fee transactions in their secret blocks.
C. By strategically releasing their blocks, they can create forks and orphan blocks found by the honest majority, causing the honest miners' effective hashrate to be wasted and increasing the selfish miner's relative share of rewards.
D. The selfish miner can perform double-spends in every secret block they mine, which is more profitable than the block reward.

54 The coinbase transaction in a Bitcoin block has a unique rule: its outputs cannot be spent for 100 blocks. What is the primary security rationale behind this 'coinbase maturity' rule?

Bitcoin blockchain Hard
A. To prevent inflation by time-locking newly created bitcoin, ensuring a stable money supply.
B. To give the network time to verify the miner's identity and ensure they are not a malicious actor.
C. To mitigate the economic instability of a deep chain reorganization; it ensures that a miner cannot spend a block reward from a block that is later orphaned.
D. To act as a mandatory staking period, forcing miners to have a long-term interest in the network's health.

55 Delegated Proof of Stake (DPoS) systems, like EOS, achieve high throughput by limiting block production to a small, elected set of 'witnesses' or 'block producers'. What is the most significant centralization risk inherent in this design?

Alternatives to Bitcoin consensus Hard
A. The small number of elected producers can form cartels to censor transactions, extract rent (e.g., through MEV), or collude to maintain their elected positions, reducing the system's permissionlessness and censorship resistance.
B. DPoS is more vulnerable to 51% attacks than PoW because it is cheaper to buy votes than to acquire equivalent hashrate.
C. The voting process is susceptible to low voter turnout, leading to a system that does not reflect the will of the majority of token holders.
D. The high cost of server hardware required to be a block producer centralizes power among the wealthy.

56 From a privacy and efficiency standpoint, what is the primary advantage of transaction 'batching' as practiced by large exchanges?

Challenges and solutions Hard
A. It reduces the total blockchain space required per payment by combining many logical payments into one transaction, thus lowering the aggregate transaction fees for the exchange.
B. It perfectly anonymizes the sender by mixing their inputs with those of many other users, similar to a CoinJoin.
C. It increases the number of confirmations required for a payment to be considered final, enhancing security.
D. It obscures the total amount of funds held by the exchange by breaking down large UTXOs into thousands of smaller ones.

57 The Bitcoin network difficulty target is a 256-bit number . A valid block hash must satisfy the condition . The maximum possible hash value is . What is the precise expected number of hashes required to find one valid block?

Proof of work Hard
A.
B.
C.
D. Difficulty, where Difficulty =

58 Consider this Bitcoin script: OP_SIZE <32> OP_EQUALVERIFY OP_SHA256 <expected_hash> OP_EQUAL. What is this script demanding from the spender in order to unlock the funds?

Bitcoin scripting language and their use Hard
A. Any piece of data that is exactly 32 bytes long.
B. A digital signature that is exactly 32 bytes long and matches the public key hash.
C. A piece of data that, when hashed with SHA256, results in <expected_hash>, and the data itself must be exactly 32 bytes long.
D. Two numbers that when added together equal 32, and their hash matches <expected_hash>.

59 A user creates a transaction with an nLockTime set to a future block height (e.g., 800,000) and all its input nSequence numbers set to 0xFFFFFFFF. What is the status of this transaction?

Bitcoin blockchain Hard
A. The transaction is invalid and will be rejected by all nodes.
B. The transaction is valid and can be included in any block immediately, as the nSequence value disables the nLockTime feature for this transaction.
C. The transaction is valid but can only be included in block 800,000 and no other block.
D. The transaction is held in the mempool by nodes but will not be included in a block until block 800,000 is mined.

60 In a Proof-of-Stake system using a Verifiable Random Function (VRF) for leader election, what is the primary security advantage this method provides over a publicly predictable algorithm (e.g., one based on the hash of the last block)?

Proof of stake Hard
A. It ensures that stakers with more stake have a proportionally higher chance of being selected.
B. It allows a validator to prove they were chosen legitimately without revealing in advance who the next validator would be, thus mitigating targeted DDoS attacks.
C. It is significantly more computationally efficient, reducing the carbon footprint of the network.
D. It prevents validators from manipulating the block data to increase their own chances of being selected in the next round.