Secure Hash Algorithm (SHA-256) output is always 256 bits or 32 bytes in length regardless of the length of the input (even if input is millions of bytes). Select best answer.
A. NSA is spying on us so what's it matters.
B. Depends on input
C. False
D. True
When you considering cryptography for a blockchain what would be types of symmetric cryptography you could consider? (Select two.)
A. Block Ciphers
B. Rivest-Shamir-Adleman algorithm aka the RSA.
C. Stream Ciphers
D. Elliptical Curve Cryptography
What is chaincode?
A. Smart contract
B. DApps
C. Node programs
D. Virtual machines
Byzantine Fault Tolerance can be achieved only through Proof of Work.
A. FALSE
B. TRUE
How are "assets" in Hyperledger Fabric represented? (Select two.)
A. JSON
B. Node
C. YAML
D. Binary
E. Deployment Manager
Chaincode is a decentralized transactional program, running on the validating nodes. As with every chaincode, it implements the ____________________ in particular, Init and Invoke functions.
What does is actually implemented?
A. SDK
B. REST Interface
C. EVM
D. Chaincode interface
In blockchains there is the concept of "Group Consensus" and how many members must agree.
A. 52%
B. 74%
C. 75%
D. 51%
E. 100%
Which of the following scenarios and databases is least suited to be utilized by a blockchain solution?
A. Scenario: Law enforcement system; Dataset: Criminal Arrests, Warrants for Arrest, Conviction Date
B. Scenario: An Email campaign service; Dataset: Recipient Email, From Email; Subject, Body
C. Scenario: A family filter wifi router; Dataset: Websites Visited, Websites Blocked, Download History
D. Scenario: Credit score app; Dataset: Credit Score, Hard Inquiries; Collections, Date Removed, Date Added
Which types of data are able to be stored on any given blockchain ledger?
A. Each blockchain software specifies its own data storage rules
B. Any data that is within the UTC-8 standard
C. Unencrypted textual and numerical data
D. Encrypted textual and numerical data
The two main types of transactions you can perform in Hyperledger Fabric are:
A. Chaincode Read and Chaincode Write transactions
B. Deploy and Invoke transactions
C. HFRead and HFAppend transactions
D. Call and Write transactions