Which types of network attacks focus on partitioning the blockchain network? Select all that apply
Answer : A, B, C
Blockchain technology is designated to be self-contained with no interaction with external components.
Answer : B
Which of the following features were exploited as part of the Verge cryptocurrency hack? Select all that apply.
Answer : A, D
Digital signatures provide confidentially, integrity , and non-repudiation.
Answer : A
Smart
contract technology can be used to securely implement a business's product ordering front-end.
Answer : A
The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.
Answer : A
Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.
Answer : B, C