Implementing data access as a blockchain smart contract is a good solution for generating an audit log of access to sensitive data.
A. True
B. False
Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?
A. Taint Analysis
B. Symbolic Execution
C. Dynamic Code Analysis
D. Control Flow Analysis
From a business perspective, which of me following is the major consideration regarding the use of smart contract technology?
A. Public Accessibility
B. Hosting Requirements
C. Code as Law" Arbitration
D. Decentralization
A major advantage of a stale channel is that it provides a permanent means of transferring value between two parties.
A. True
B. False
Which of the following are good ways to get pseudo-random numbers for smart contracts?
A. Private variables
B. Private functions
C. Block hashes
D. External oracle
Which of the following attacks only requires a single account and performs only normal blockchain operations?
A. Replay Attack
B. Routing Attack
C. 51% Attack
D. Eclipse Attack
Which type of blockchain is most vulnerable to traditional Denial of Service attacks?
A. Proof of Stake
B. Proof of Work
C. Proof of Activity
D. Proof of Space
E. All of the above
Which of the following is a takenaway from the pigeocoin/Bitcom Core hack?
A. Importance of scaning code for common vulnerabilities
B. Importance of cryptanalysis of algorithms used
C. Import of system-level analysis
D. Import of a robust change management process
Which smart contract auditing strategy identities which variables in the function can be affected by the person running it?
A. Manual Code Analysis
B. Symbolic Execution
C. Taint Analysis
D. Control Flow Analysis
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?
A. Proof of Burn
B. Proof of Work
C. Proof of Stake
D. Proof of Activity
E. None of the above