Linux Foundation HFCP Exam (page: 1)
Linux Foundation Hyperledger Fabric Certified Practitioner
Updated on: 12-Sep-2025

Viewing Page 1 of 13

An enterprise blockchain is a permission blockchain node distributed to whom?

  1. Administration data center
  2. Nodes distributed with a validator
  3. Member organizations
  4. Nodes distributed on a public Blockchain

Answer(s): C

Explanation:

In Hyperledger Fabric, the enterprise blockchain is a permissioned network where nodes are distributed among the member organizations that participate in the blockchain network. This is in contrast to a public blockchain where anyone can participate anonymously. In a permissioned blockchain like Hyperledger Fabric, the participants are known entities within a business network, such as enterprises or organizations, that have specific permissions and roles within the network. This setup enhances security and trust as each participant is vetted and authorized to take part in the network operations. The architecture of Hyperledger Fabric is designed to support such a governance model, where multiple organizations can interact in a secure and regulated environment, maintaining their own ledgers but sharing data that require consensus across known entities.



An endorsement policy lists what?

  1. The number of organizations involved in a transaction.
  2. The number of peers needed to endorse a transaction.
  3. The order in which transactions are executed.
  4. The identities required for endorsing a transaction.

Answer(s): D

Explanation:

In Hyperledger Fabric, an endorsement policy specifies which network participants, identified by their digital identities, must endorse a transaction before it can be considered valid. This is crucial for the network's security and integrity, as it controls how transactions are approved and added to the ledger. Endorsement policies are part of the channel configuration and can be customized to fit the specific needs of a business network. They dictate the necessary endorsements from specific organizations or even particular roles within those organizations, ensuring that only authorized entities can validate transactions. This mechanism supports the collaborative yet secure nature of the enterprise blockchain, where trust is decentralized across different organizations that are part of the network.



A smart contract can call other smart contracts both within the same channel and across different channels.
Which of the following transactions is inter-contract communication whose functionality is limited?

  1. Chaincode X calls Getstate in Chaincode Y on the same channel.
  2. Chaincode X calls Putstate in Chaincode Y on the same channel.
  3. Chaincode X calls Getstate in Chaincode Y on a different channel.
  4. Chaincode X calls Putstate in Chaincode Y on a different channel.

Answer(s): D

Explanation:

In Hyperledger Fabric, inter-contract communication is possible both within the same channel and across different channels. However, the functionality to alter the state (using PutState) of a chaincode on a different channel is restricted. This limitation is due to the security and isolation principles of channels in Hyperledger Fabric, where each channel represents a separate ledger and state. Transactions within a channel can read and write data freely, subject to endorsement policies, but writing data to another channel's chaincode directly is not permitted. This prevents unauthorized influence on a separate and potentially isolated business process, ensuring that operations within a channel are controlled and secure.



When building a test network, how many nodes are adequate for an Ordering Service?

  1. There is no set number of nodes required for an Ordering Service.
  2. Three ordering nodes are needed for a test Ordering Service.
  3. One ordering nodes is sufficient for an Ordering Service.
  4. Ordering Service nodes are optional in a test network.

Answer(s): C

Explanation:

For a test network in Hyperledger Fabric, one ordering node is sufficient to form an Ordering Service7. The test network typically uses a single-node Raft ordering service for simplicity and educational purposes.However, for production networks, a multi-node ordering service is recommended for fault tolerance and high availability8.



Regarding peer lifecycle chaincode, which of the following is the incorrect (unsupported) subcommand for query?

  1. peer lifecycle chaincode querypackaged
  2. peer lifecycle chaincode querycommitted
  3. peer lifecycle chaincode queryapproved
  4. peer lifecycle chaincode queryinstalled

Answer(s): A

Explanation:

The correct subcommands for querying in the peer lifecycle chaincode arequeryinstalled,queryapproved,checkcommitreadiness,commit, andquerycommitted1. The subcommandquerypackagedis not a supported subcommand for querying in the peer lifecycle chaincode.



Viewing Page 1 of 13



Share your comments for Linux Foundation HFCP exam with other users:

Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous


Yves 8/29/2023 8:46:00 PM

very inciting
Anonymous