Unit 4 - Practice Quiz

CSC203 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the approximate target time for creating a new block in the Bitcoin blockchain?

Bitcoin blockchain Easy
A. 10 minutes
B. 1 second
C. 1 hour
D. 1 minute

2 What is the very first block in the Bitcoin blockchain commonly called?

Bitcoin blockchain Easy
A. The Prime Block
B. The Alpha Block
C. The Genesis Block
D. The Final Block

3 Who is the pseudonymous creator or group of creators of Bitcoin?

Bitcoin blockchain Easy
A. Hal Finney
B. Charles Hoskinson
C. Vitalik Buterin
D. Satoshi Nakamoto

4 How are blocks in the Bitcoin blockchain cryptographically connected to form a chain?

Bitcoin blockchain Easy
A. Each block contains a direct memory pointer to the previous one.
B. Each block contains the hash of the previous block.
C. Each block contains the private key of the previous block.
D. Each block is signed by a central server.

5 In the context of digital currencies, what does the 'double-spending' problem refer to?

Challenges and solutions Easy
A. Exchanging one cryptocurrency for another twice.
B. Paying twice the price for a single item.
C. A user successfully spending the same digital money more than once.
D. A bug that doubles a user's wallet balance.

6 What is a '51% attack' on a Proof of Work blockchain like Bitcoin?

Challenges and solutions Easy
A. An attack that steals 51% of all Bitcoins in circulation.
B. A situation where a single entity controls more than 50% of the network's mining power.
C. A social engineering attack targeting 51% of users.
D. A software bug that affects 51% of the network nodes.

7 How does the Bitcoin network's difficulty adjustment feature work as a solution?

Challenges and solutions Easy
A. It makes transactions more expensive.
B. It changes the block reward for miners.
C. It deletes old transactions from the blockchain to save space.
D. It aims to keep the block creation time at approximately 10 minutes.

8 What is the primary role of the Proof of Work (PoW) consensus algorithm in Bitcoin?

Proof of work Easy
A. To create new Bitcoin out of thin air.
B. To speed up transaction processing to millions per second.
C. To encrypt user wallets.
D. To secure the network and achieve consensus on the valid transaction ledger.

9 The process of performing the computations for Bitcoin's Proof of Work is commonly called what?

Proof of work Easy
A. Staking
B. Validating
C. Mining
D. Forging

10 What cryptographic hash algorithm is central to Bitcoin's Proof of Work?

Proof of work Easy
A. SHA-256
B. MD5
C. SHA-1
D. Scrypt

11 What do miners receive as a reward for successfully creating a new block in Bitcoin?

Proof of work Easy
A. Newly created bitcoins (block reward) and transaction fees.
B. A certificate of appreciation.
C. Voting rights in the network's governance.
D. Interest on the bitcoins they hold.

12 In a Proof of Stake (PoS) system, what is the primary factor that determines a user's chance of creating the next block?

Proof of stake Easy
A. The amount of cryptocurrency they hold and are willing to 'stake'.
B. The number of transactions they have sent.
C. The age of their account on the network.
D. The speed of their computer.

13 A major advantage of Proof of Stake (PoS) when compared to Proof of Work (PoW) is that it is significantly more...

Proof of stake Easy
A. Energy-efficient
B. Decentralized
C. Time-tested and established
D. Complex to implement

14 What is the process of creating new blocks often called in a Proof of Stake system?

Proof of stake Easy
A. Forging or Minting
B. Mining or Hashing
C. Signing or Authorizing
D. Printing or Coding

15 In Delegated Proof of Stake (DPoS), how are the block producers (validators) chosen?

Alternatives to Bitcoin consensus Easy
A. They are the wealthiest coin holders.
B. They are appointed by the network's founding developers.
C. They are chosen randomly by the protocol.
D. They are elected by other coin holders through a voting system.

16 Which type of consensus algorithm is generally best suited for private or permissioned blockchains where participants are known?

Alternatives to Bitcoin consensus Easy
A. Proof of Work (PoW)
B. Proof of Burn (PoB)
C. Proof of Capacity (PoC)
D. Practical Byzantine Fault Tolerance (PBFT)

17 Proof of Authority (PoA) is a consensus mechanism where block validators are chosen based on their...

Alternatives to Bitcoin consensus Easy
A. Established reputation and identity
B. Amount of staked coins
C. Age on the network
D. Computational power

18 What is the name of the built-in, stack-based scripting language of Bitcoin?

Bitcoin scripting language and their use Easy
A. C++
B. Script
C. Solidity
D. Javascript

19 Why is Bitcoin's scripting language intentionally designed to be non-Turing-complete?

Bitcoin scripting language and their use Easy
A. To reduce the potential for bugs and prevent infinite loops.
B. To make it easier for new programmers to learn.
C. To make it faster than other languages.
D. To allow for more complex smart contracts, like those on Ethereum.

20 A multi-signature (multisig) wallet, which requires M-of-N signatures to spend funds, is a feature enabled by what component of Bitcoin?

Bitcoin scripting language and their use Easy
A. The Proof of Work algorithm
B. The Bitcoin scripting language
C. The peer-to-peer network structure
D. The fixed supply of 21 million coins

21 A user sends 1 BTC from an address that holds a single UTXO of 3 BTC to a new address. Assuming a 0.001 BTC transaction fee, how is the UTXO set updated after this transaction is confirmed in a block?

Bitcoin blockchain Medium
A. The 3 BTC UTXO is consumed, and three new UTXOs are created: 1 BTC for the recipient, 1.999 BTC for change, and 0.001 BTC for the miner.
B. The original 3 BTC UTXO is updated to a value of 1.999 BTC, and a new 1 BTC UTXO is created for the recipient.
C. The 3 BTC UTXO is consumed, and two new UTXOs are created: one for 1 BTC (to the recipient) and one for 1.999 BTC (as change to the sender).
D. The 3 BTC UTXO is consumed, and one new UTXO of 2.999 BTC is created for the sender's change address.

22 What is the primary security and efficiency advantage of using a Merkle root in the Bitcoin block header instead of including all individual transaction hashes directly?

Bitcoin blockchain Medium
A. It enables Simplified Payment Verification (SPV) clients to verify a transaction's inclusion without downloading the entire block.
B. It allows for transaction hashes to be compressed, saving space in the block.
C. It provides a way to order transactions chronologically within the block header.
D. It makes the block header's hash easier to calculate for miners.

23 The Bitcoin network difficulty is designed to adjust every 2016 blocks to target an average block time of 10 minutes. If, due to a massive increase in hash rate, the last 2016 blocks were mined in only 7 days, what would the network's response be?

Proof of work Medium
A. The block reward would be halved to slow down miners.
B. The network would temporarily halt to allow for manual adjustment.
C. The difficulty would decrease by approximately 50%.
D. The difficulty would increase by approximately 100%.

24 How did the Segregated Witness (SegWit) upgrade primarily address the issue of third-party transaction malleability in Bitcoin?

Challenges and solutions Medium
A. By encrypting the digital signature so it cannot be altered.
B. By requiring multiple signatures for every transaction, making alteration more difficult.
C. By moving the signature data (the "witness") from the main transaction body to a separate data structure, so it no longer affects the transaction ID (txid).
D. By increasing the network fee for any transaction that has been altered.

25 What is the "nothing-at-stake" problem in Proof of Stake consensus mechanisms, and why is it generally not an issue in Proof of Work?

Proof of stake Medium
A. Staked coins can be lost due to network errors, while PoW mining equipment is a physical asset.
B. In the event of a fork, a PoS validator can cheaply vote for both chains to maximize potential rewards, whereas a PoW miner must split their expensive hash power.
C. PoS validators risk nothing if they propose an invalid block, unlike PoW miners who lose electricity costs.
D. Validators have no incentive to validate transactions, whereas PoW miners are paid block rewards.

26 A Pay-to-Script-Hash (P2SH) transaction output is locked with a hash of a redeem script. What must the spender provide in the input's scriptSig to successfully unlock these funds?

Bitcoin scripting language and their use Medium
A. A new script hash that matches the original one.
B. The full, unhashed redeem script and the data (e.g., signatures) that make that redeem script evaluate to true.
C. The private key used to generate the address, which the network then uses to generate the redeem script.
D. Just the digital signature corresponding to the public key.

27 How does Delegated Proof of Stake (DPoS) attempt to solve the scalability and performance issues seen in Proof of Work, and what is the primary trade-off?

Alternatives to Bitcoin consensus Medium
A. It requires all coin holders to participate in block validation, which improves security but slows down the network.
B. It randomly selects a new block producer every 10 minutes from the entire pool of stakers, improving decentralization.
C. It uses a small, fixed number of elected block producers, allowing for faster block confirmation, at the cost of increased centralization.
D. It replaces mining with a lottery system, reducing energy consumption but making the network vulnerable to Sybil attacks.

28 A malicious actor gains control of 51% of the Bitcoin network's hash rate. Which of the following attacks could they successfully execute?

Challenges and solutions Medium
A. Spend their own bitcoins, wait for confirmation, and then create a fork to reverse that specific transaction, allowing them to double-spend the coins.
B. Steal bitcoins from an address for which they do not possess the private key.
C. Reverse any transaction on the blockchain, including one from several years ago.
D. Create new bitcoins out of thin air, exceeding the 21 million supply limit.

29 In the context of Bitcoin's PoW, what does it mean for the hash function (SHA-256) to be "puzzle-friendly"?

Proof of work Medium
A. The function is easy to compute in one direction but extremely difficult to reverse.
B. Given a specific output range y, it is infeasible to find an input x such that H(x) falls in y by any method more efficient than random guessing.
C. The output of the hash function is always a fixed length, regardless of the input size.
D. A small change in the input x results in a completely different, unpredictable output hash.

30 What is the primary reason for Bitcoin's scripting language (Script) being intentionally designed as non-Turing complete?

Bitcoin scripting language and their use Medium
A. To reduce the computational power required by miners to run the scripts.
B. To prevent infinite loops and ensure transaction validation is always predictable and finite, protecting the network from denial-of-service attacks.
C. To make the language easier for new developers to learn.
D. To comply with international financial regulations that limit the complexity of smart contracts.

31 In a Proof of Stake system that implements "slashing", what is the main purpose of this mechanism?

Proof of stake Medium
A. To reduce the total supply of the cryptocurrency over time.
B. To randomly select which validator's stake will be used for the next block reward.
C. To reward validators who have the longest uptime.
D. To create a strong economic disincentive for validators who act maliciously, such as by double-signing blocks.

32 What is the fundamental principle behind how the Lightning Network aims to solve Bitcoin's scalability problem?

Challenges and solutions Medium
A. By compressing transaction data on the main blockchain using a new algorithm like ZK-SNARKs.
B. By increasing Bitcoin's block size from 1MB to 8MB to accommodate more transactions.
C. By reducing the block time from 10 minutes to 1 minute, thereby increasing on-chain throughput.
D. By creating an off-chain, peer-to-peer layer of payment channels where multiple transactions can occur without being immediately broadcast to the main blockchain.

33 The block reward in Bitcoin is the primary incentive for miners. How do transaction fees contribute to the long-term security model of the Bitcoin network?

Proof of work Medium
A. Transaction fees are paid directly to full nodes for validating transactions, separate from the miners' block reward.
B. Transaction fees are designed to eventually become the primary incentive for miners as the block reward subsidy diminishes to zero through periodic halvings.
C. Transaction fees are burned to reduce the total supply of Bitcoin.
D. Transaction fees are used to speed up the difficulty adjustment process.

34 What is a key characteristic of consensus mechanisms like Practical Byzantine Fault Tolerance (PBFT) that makes them suitable for permissioned blockchains but less so for public ones like Bitcoin?

Alternatives to Bitcoin consensus Medium
A. PBFT allows anyone to become a validator without permission, which is insecure in a private setting.
B. PBFT consumes significantly more energy than Proof of Work, making it too expensive for public networks.
C. PBFT is probabilistic and never achieves absolute finality, making it unsuitable for enterprise use.
D. PBFT relies on a known, and often small, set of validators, providing transaction finality but requiring participants to be identified.

35 What is the role of the nLockTime parameter in a Bitcoin transaction?

Bitcoin blockchain Medium
A. It specifies the maximum amount of time a miner has to include the transaction in a block.
B. It indicates the exact time the transaction was created, which is used to resolve transaction ordering conflicts.
C. It defines a future time (as a block height or Unix timestamp) before which the transaction is invalid and cannot be included in a block.
D. It is a nonce used by the sender to prevent transaction replay attacks on other blockchains.

36 A standard Pay-to-Public-Key-Hash (P2PKH) transaction script is validated by concatenating the scriptSig and scriptPubKey and executing them. For a valid transaction, what should be the final state of the stack after execution?

Bitcoin scripting language and their use Medium
A. The stack should contain the number 0.
B. The stack should be empty.
C. The stack should contain the public key of the spender.
D. The stack should contain a single value that evaluates to TRUE (a non-zero number).

37 Which of the following describes the concept of "probabilistic finality" in Nakamoto Consensus (Proof of Work) as used by Bitcoin?

Alternatives to Bitcoin consensus Medium
A. Transactions have a 50/50 chance of being reversed until they are at least 10 blocks deep.
B. Finality is determined by a vote among a committee of nodes, and the result is probabilistic.
C. A transaction is considered absolutely final the moment it is included in one block.
D. The probability of a confirmed transaction being reversed decreases exponentially as more blocks are added on top of it, but never reaches absolute certainty.

38 The "selfish mining" attack is a strategy where a miner finds a block but keeps it private, attempting to mine a second block on top of their secret one. What is the primary goal of this strategy?

Challenges and solutions Medium
A. To earn a disproportionately larger share of mining rewards than their hash rate would normally entitle them to, by selectively orphaning blocks from honest miners.
B. To steal bitcoins directly from other users' wallets.
C. To reduce the overall network difficulty, making it easier to mine future blocks.
D. To shut down the entire Bitcoin network by creating an endless chain of orphaned blocks.

39 A miner is trying to find a valid block hash. The current target requires the block hash to start with 10 leading zeros. If the network difficulty increases significantly, what would be the most likely new target?

Proof of work Medium
A. A target requiring the hash to start with 12 leading zeros.
B. A target requiring the hash to start with 8 leading zeros.
C. A target requiring the hash to be an even number.
D. A target requiring the hash to contain the previous block's nonce.

40 In the context of the Unspent Transaction Output (UTXO) model, what primarily prevents a user from spending the same digital coin twice in two different unconfirmed transactions that are broadcast simultaneously?

Bitcoin blockchain Medium
A. The user's private key changes after each transaction is broadcast, invalidating the second transaction's signature.
B. Miners will typically only accept the first of the two conflicting transactions they see into their memory pool, and will reject the second as an invalid double-spend attempt.
C. Each coin is time-stamped, and only the earliest transaction is considered valid by the network.
D. The Bitcoin protocol limits each address to one broadcast transaction per minute.

41 A P2SH address funds a redeem script with the following logic: OP_IF <2 pubkeyA pubkeyB pubkeyC 3 OP_CHECKMULTISIG> OP_ELSE <NOW + 90 days> OP_CHECKLOCKTIMEVERIFY OP_DROP <pubkeyD> OP_CHECKSIG OP_ENDIF. What is the most precise description of the spending conditions for the funds locked in this script?

Bitcoin scripting language and their use Hard
A. A 2-of-3 multisignature from keys A, B, or C can spend the funds immediately, OR a single signature from key D can spend the funds, but only in a transaction with an nLockTime set to at least 90 days in the future.
B. A 2-of-3 multisignature from keys A, B, and C is required, AND the transaction must be signed by key D after a 90-day delay.
C. The funds can only be spent by a 2-of-3 multisignature from A, B, and C if a non-zero value is pushed to the stack, otherwise key D can spend them immediately.
D. The script is invalid because OP_CHECKLOCKTIMEVERIFY cannot be combined with OP_CHECKMULTISIG in the same redeem script.

42 A mining pool contributes 15% of the total network hashrate. The network difficulty is stable, resulting in an average block time of 10 minutes for the entire network. What is the approximate probability that this specific pool will find at least one block within the next 60 minutes?

Proof of work Hard
A. Approximately 15%
B. Exactly 60%
C. Approximately 59.4%
D. Exactly 90%

43 In the context of Bitcoin's privacy, what is the primary limitation of using a new address for every transaction (a core principle of wallet hygiene) in preventing deanonymization via transaction graph analysis?

Challenges and solutions Hard
A. It actually increases the on-chain footprint, making it easier for analysts to identify large entities.
B. It fails to break the 'common-input-ownership' heuristic, where multiple inputs to a single transaction are assumed to belong to the same entity.
C. It is computationally expensive and not supported by most modern wallet software.
D. It does not protect against analysis of transaction timing and value, which can still link activities.

44 Before the activation of Segregated Witness (SegWit), third-party transaction malleability was a significant issue. How could a third party (e.g., a node or miner) alter a transaction's hash (txid) without invalidating the ECDSA signature itself, and what was the main consequence for chained transactions?

Bitcoin blockchain Hard
A. By adding extra data to the coinbase transaction, which changed the Merkle root and thus the txid of every transaction in the block.
B. By using a different but cryptographically valid serialization for the signature (e.g., changing S to -S mod N), which changed the txid and broke the input reference for any unconfirmed child transaction.
C. By altering the scriptPubKey, which is not covered by the signature, thus changing the txid and redirecting the funds.
D. By changing the nLockTime field of the transaction, which is not signed, causing the txid to change and the transaction to be delayed.

45 The 'Nothing-at-Stake' problem in early Proof-of-Stake designs describes a scenario where validators are economically incentivized to validate on all competing forks, preventing consensus. How do modern PoS systems like Ethereum 2.0 primarily solve this problem?

Proof of stake Hard
A. By using a Delegated Proof of Stake (DPoS) model where only a small number of trusted validators can create blocks.
B. By requiring validators to solve a small proof-of-work puzzle for each block they produce.
C. By introducing 'slashing' conditions, where a validator's stake is destroyed if they are caught signing blocks for multiple competing chains at the same height.
D. By increasing block rewards to a level where the incentive to be honest on one chain outweighs the potential rewards from all other chains combined.

46 A Pay-to-Witness-Script-Hash (P2WSH) output is created for a 2-of-2 multisig script. How is this transaction's output script (scriptPubKey) represented on the Bitcoin blockchain, and what data must the spender provide in the transaction's witness field?

Bitcoin scripting language and their use Hard
A. The scriptPubKey is OP_HASH160 <20-byte-hash-of-script> OP_EQUAL. The spender provides the two signatures and the full redeem script in the scriptSig.
B. The scriptPubKey is empty. The spender provides the two signatures, the two public keys, and the script hash in the witness field.
C. The scriptPubKey contains the full script: <2 pubkeyA pubkeyB 2 OP_CHECKMULTISIG>. The spender provides only the two signatures in the witness field.
D. The scriptPubKey is OP_0 <32-byte-SHA256-hash-of-script>. The spender provides the two signatures followed by the full serialized redeem script in the witness field.

47 How does the concept of 'finality' in Bitcoin's Nakamoto Consensus (Proof-of-Work) fundamentally differ from finality in a classical consensus algorithm like Practical Byzantine Fault Tolerance (PBFT)?

Alternatives to Bitcoin consensus Hard
A. Bitcoin provides probabilistic finality that grows stronger with each confirmation, whereas PBFT provides absolute (deterministic) finality once a round of voting is complete, assuming less than 1/3 of nodes are malicious.
B. Both provide probabilistic finality, but Bitcoin's is based on economic incentives while PBFT's is based on cryptographic signatures.
C. Bitcoin provides absolute finality after 6 confirmations, while PBFT finality is always probabilistic.
D. Finality in Bitcoin is achieved when a block is broadcast, while in PBFT it is achieved only after a supermajority of nodes have mined a subsequent block.

48 The Bitcoin difficulty adjustment algorithm retargets every 2016 blocks. If a sudden and sustained 40% decrease in network hashrate occurs immediately following a difficulty adjustment, what will be the approximate average block time during the next 2016-block epoch?

Proof of work Hard
A. 6 minutes
B. 16.67 minutes
C. 10 minutes
D. 14 minutes

49 In the Bitcoin Lightning Network, what is the primary role of the to_self_delay parameter in the script of a commitment transaction output, and why is it crucial for the security of a cheating party's funds?

Challenges and solutions Hard
A. It defines the maximum amount of time a payment (HTLC) can be in transit before it is automatically cancelled.
B. It is a network-wide constant that prevents transactions from being confirmed too quickly, reducing the risk of chain re-organizations.
C. It forces the cheating party to wait for a specified period before they can claim their own funds from a broadcasted old state, giving the other party a window to broadcast a penalty transaction.
D. It sets the expiration date for the entire payment channel, after which all funds are returned to their original owners.

50 A Bitcoin block header contains a Merkle Root, which is a hash of all transactions in the block. If an attacker could find a SHA-256 collision (i.e., two different transaction datasets T1 and T2 where HASH256(T1) = HASH256(T2)), how could they exploit this to defraud a user?

Bitcoin blockchain Hard
A. They could create a block that is valid for both T1 and T2, show the user a block explorer confirming T1 (a payment to the user), but broadcast the block containing T2 (a payment to the attacker) to the network.
B. They could use the collision to create a single transaction that appears to pay two different addresses with the same funds.
C. They could mine a block much faster because finding the collision reduces the nonce search space.
D. This is a purely theoretical attack because the double-SHA256 (HASH256) used for txids is fundamentally immune to collision attacks, unlike single-SHA256.

51 A 'long-range attack' is a specific vulnerability in Proof-of-Stake systems. It is most effective against which type of network participant?

Proof of stake Hard
A. Existing, fully-synced validators who have been online for a long time.
B. Exchanges and large custodians who process a high volume of transactions.
C. New nodes that are syncing the blockchain for the first time or nodes that have been offline for an extended period.
D. Miners who are switching from a Proof-of-Work chain to a Proof-of-Stake chain.

52 The Taproot upgrade introduces Pay-to-Taproot (P2TR) outputs. In the case of a 'script-path spend', where one of the complex spending conditions from the Merkle tree is used, what must be included in the witness data in addition to the inputs required by the script itself?

Bitcoin scripting language and their use Hard
A. The entire Merkle tree, containing all possible spending scripts.
B. The full public key of every potential participant in all possible script paths.
C. A signature from the 'internal key' proving that the key-path spend was not possible.
D. The specific script being executed, along with a Merkle proof (the branch of hashes) connecting that script's hash to the Merkle root that is committed to in the Taproot output.

53 In a 'selfish mining' attack, a mining pool with hashrate keeps its discovered blocks private. What is the primary game-theoretic reason this strategy can be more profitable than honest mining for ?

Proof of work Hard
A. The selfish miner earns higher transaction fees by exclusively including high-fee transactions in their secret blocks.
B. By strategically releasing their blocks, they can create forks and orphan blocks found by the honest majority, causing the honest miners' effective hashrate to be wasted and increasing the selfish miner's relative share of rewards.
C. The selfish miner can perform double-spends in every secret block they mine, which is more profitable than the block reward.
D. By keeping blocks secret, the selfish miner solves them at a lower difficulty, as the public network difficulty has not yet adjusted to their hashrate.

54 The coinbase transaction in a Bitcoin block has a unique rule: its outputs cannot be spent for 100 blocks. What is the primary security rationale behind this 'coinbase maturity' rule?

Bitcoin blockchain Hard
A. To act as a mandatory staking period, forcing miners to have a long-term interest in the network's health.
B. To give the network time to verify the miner's identity and ensure they are not a malicious actor.
C. To mitigate the economic instability of a deep chain reorganization; it ensures that a miner cannot spend a block reward from a block that is later orphaned.
D. To prevent inflation by time-locking newly created bitcoin, ensuring a stable money supply.

55 Delegated Proof of Stake (DPoS) systems, like EOS, achieve high throughput by limiting block production to a small, elected set of 'witnesses' or 'block producers'. What is the most significant centralization risk inherent in this design?

Alternatives to Bitcoin consensus Hard
A. The voting process is susceptible to low voter turnout, leading to a system that does not reflect the will of the majority of token holders.
B. The high cost of server hardware required to be a block producer centralizes power among the wealthy.
C. DPoS is more vulnerable to 51% attacks than PoW because it is cheaper to buy votes than to acquire equivalent hashrate.
D. The small number of elected producers can form cartels to censor transactions, extract rent (e.g., through MEV), or collude to maintain their elected positions, reducing the system's permissionlessness and censorship resistance.

56 From a privacy and efficiency standpoint, what is the primary advantage of transaction 'batching' as practiced by large exchanges?

Challenges and solutions Hard
A. It perfectly anonymizes the sender by mixing their inputs with those of many other users, similar to a CoinJoin.
B. It obscures the total amount of funds held by the exchange by breaking down large UTXOs into thousands of smaller ones.
C. It reduces the total blockchain space required per payment by combining many logical payments into one transaction, thus lowering the aggregate transaction fees for the exchange.
D. It increases the number of confirmations required for a payment to be considered final, enhancing security.

57 The Bitcoin network difficulty target is a 256-bit number . A valid block hash must satisfy the condition . The maximum possible hash value is . What is the precise expected number of hashes required to find one valid block?

Proof of work Hard
A.
B.
C.
D. Difficulty, where Difficulty =

58 Consider this Bitcoin script: OP_SIZE <32> OP_EQUALVERIFY OP_SHA256 <expected_hash> OP_EQUAL. What is this script demanding from the spender in order to unlock the funds?

Bitcoin scripting language and their use Hard
A. Two numbers that when added together equal 32, and their hash matches <expected_hash>.
B. Any piece of data that is exactly 32 bytes long.
C. A piece of data that, when hashed with SHA256, results in <expected_hash>, and the data itself must be exactly 32 bytes long.
D. A digital signature that is exactly 32 bytes long and matches the public key hash.

59 A user creates a transaction with an nLockTime set to a future block height (e.g., 800,000) and all its input nSequence numbers set to 0xFFFFFFFF. What is the status of this transaction?

Bitcoin blockchain Hard
A. The transaction is valid but can only be included in block 800,000 and no other block.
B. The transaction is valid and can be included in any block immediately, as the nSequence value disables the nLockTime feature for this transaction.
C. The transaction is invalid and will be rejected by all nodes.
D. The transaction is held in the mempool by nodes but will not be included in a block until block 800,000 is mined.

60 In a Proof-of-Stake system using a Verifiable Random Function (VRF) for leader election, what is the primary security advantage this method provides over a publicly predictable algorithm (e.g., one based on the hash of the last block)?

Proof of stake Hard
A. It is significantly more computationally efficient, reducing the carbon footprint of the network.
B. It prevents validators from manipulating the block data to increase their own chances of being selected in the next round.
C. It ensures that stakers with more stake have a proportionally higher chance of being selected.
D. It allows a validator to prove they were chosen legitimately without revealing in advance who the next validator would be, thus mitigating targeted DDoS attacks.