Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data.
A. True
B. False
A blockchain-based solution best achieves which of the following goals?
A. Data control
B. Data deletion
C. Data retention
D. Data privacy
Which of the following blockchains has a built-in consensus algorithm?
A. Ethereum
B. Corda
C. Hyperledger
Which of the following does NOT rely on the security of public key cryptography?
A. Stealth Address
B. Confidential Transaction
C. Ring Signature
D. Zero-Knowledge Proof
A controversial update to blockchain functionality could increase the vulnerability of the blockchain to attack.
A. True
B. False
Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?
A. Taint Analysis
B. Symbolic Execution
C. Dynamic Code Analysis
D. Control Flow Analysis
Scanning against a list of common vulnerabilities is an important component of smart contract auditing.
A. True
B. False
From a business perspective, which of me following is the major consideration regarding the use of smart contract technology?
A. Public Accessibility
B. Hosting Requirements
C. Code as Law" Arbitration
D. Decentralization
A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.
A. True
B. False
Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply
A. Bad Randomness
B. Short Addresses
C. Timestamp Dependence
D. Race Conditions