Which of the following blockchains uses a channel-focused architectural design?
Answer : B
Which of the following are shared benefits of private and permissioned blockchain architectures? Select all that apply.
Answer : B, C
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
Answer : C, D
Which of the following blockchains does NOT tie real-world identity to public keys on the blockchain?
Answer : B
The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms
Answer : B
Malicious smart contracts can potentially infect the nodes running the blockchain software
Answer : A
What is the easiest way to steal cryptocurrency from a user?
Answer : A