Blockchain CBSA Exam (page: 1)
Blockchain BTA Certified Solution Architect
Updated on: 25-Dec-2025

Viewing Page 1 of 47

SHA-1 is the most commonly used SHA algorithm, and produces a ____________-byte hash value(size).

  1. 256
  2. 128
  3. 32
  4. 20

Answer(s): D

Explanation:

SHA-1 is the most commonly used SHA algorithm, and produces a 20-byte hash value.


Reference:

https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting



What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s Blockchain where the majority of hashpower could possibly be controlled thru an attack?

What is the specific attack Bitcoin could be exposed to?

  1. 51% Attacks
  2. Tether Token Hack
  3. DDoS Attack
  4. BIP attack
  5. Parity Wallet Attack

Answer(s): A


Reference:

https://blockgeeks.com/guides/hypothetical-attacks-on-cryptocurrencies/



How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)

  1. 1,000,000,000,000,000,000
  2. 1,000,000,000,000,000
  3. 1,000,000,000
  4. 10,000
  5. 1,000,000,000,000

Answer(s): A,B


Reference:

http://www.btcsatoshi.com/



In the Proof of Stake(POS) algorithm the miners are really known as ____________?

  1. Notary
  2. Oracle
  3. Forgers
  4. Minters

Answer(s): C

Explanation:

Proof of Stake has the same goal as proof of work—to validate transactions and achieve consensus in the chain—and it uses an algorithm but with a different process. With proof of stake, the creator of a new block “is chosen in a deterministic way, depending on its wealth, also defined as a stake.” Since in a proof of stake system, there is no block reward, but the miners, known as forgers, get the transaction fees. Proponents of this shift, including Ethereum co-founder Buterin, like proof of stake for the energy and cost savings realized to get to a distributed form of consensus.


Reference:

http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read



A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that requires ____________. What is required?

  1. Consensus
  2. Crypthography
  3. Bandwidth
  4. Availability

Answer(s): A

Explanation:

A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus.


Reference:

https://en.wikipedia.org/wiki/Byzantine_fault_tolerance



Viewing Page 1 of 47



Share your comments for Blockchain CBSA exam with other users:

Jorn 7/13/2023 5:05:00 AM

relevant questions
UNITED KINGDOM


AM 6/20/2023 7:54:00 PM

please post
UNITED STATES


Nagendra Pedipina 7/13/2023 2:22:00 AM

q:42 there has to be a image in the question to choose what does it mean from the options
INDIA


BrainDumpee 11/18/2023 1:36:00 PM

looking for cphq dumps, where can i find these for free? please and thank you.
UNITED STATES


sheik 10/14/2023 11:37:00 AM

@aarun , thanks for the information. it would be great help if you share your email
Anonymous


Random user 12/11/2023 1:34:00 AM

1z0-1078-23 need this dumps
Anonymous


labuschanka 11/16/2023 6:06:00 PM

i gave the microsoft azure az-500 tests and prepared from this site as it has latest mock tests available which helped me evaluate my performance and score 919/1000
Anonymous


Marianne 10/22/2023 11:57:00 PM

i cannot see the button to go to the questions
Anonymous


sushant 6/28/2023 4:52:00 AM

good questions
EUROPEAN UNION


A\MAM 6/27/2023 5:17:00 PM

q-6 ans-b correct. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-cli-quick-start/use-the-cli/commit-configuration-changes
UNITED STATES


unanimous 12/15/2023 6:38:00 AM

very nice very nice
Anonymous


akminocha 9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps
INDIA


Jefi 9/4/2023 8:15:00 AM

please upload the practice questions
Anonymous


Thembelani 5/30/2023 2:45:00 AM

need this dumps
Anonymous


Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA