Which of the following blockchains uses a channel-focused architectural design?
Answer : B
Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.
Answer : B, C
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
Answer : C, D
Which of the following blockchains does NOT tie real-world identity to public keys on the blockchain?
Answer : B
The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms
Answer : B
Data subject to deletion procedures should be stored encrypted on-chain.
Answer : B
Which of the following blockchains is designed to allow multiple blockchains to run on the same network?
Answer : A