M5 -PG - Block Chain Client - 22 Batch II MSC IT
M5 -PG - Block Chain Client - 22 Batch II MSC IT
S U
YE MA CHA SE Q.T
N U NI QUESTION
AR JOR PTER C. YPE
O B T
1 20 MSI M 1 1 A OBJ
22 T 5 Blockchain networks
are much _____ and
deal with no real
single point of failure.
Easie
Simple
B r to
r
scale
Conve Faste
D
nient r
Answer is : B
2 20 MSI M 1 1 A OBJ
22 T 5 What does P2P stand
for?
Produ
Peer to ct to
A Peer B Produ
ct
Passwo Peer
rd to to
C Passwo D Proce
rd ss
Answer is : A
3 20 MSI M 1 1 A OBJ
22 T 5 What does a block in a
Blockchain have?
Header
Bitcoi
&
A Digital B ns &
Input
ledger
Transa
Heade
ctions
r&
C & D Transa
Bitcoin
ction
s
Answer is : D
4 20 MSI M 1 1 A OBJ
22 T 5 What does UTXO
stand for?
Unspen
t
Unspe
Transac
nt
A Trade B tion
xeroxe
Offer
d
Output
Uniqu Unspen
e t
C Trans D Transac
action tion
Offer Output
Answer is : D
5 20 MSI M 1 1 A OBJ
22 T 5 Transaction 0 in every
block of the bitcoin
blockchain________.
Does
Is for
not
paying
have
A the B any
miner
input
fees
UTXO
C Is called D All
the the
coinbas Abov
e
transac e
tion
Answer is : D
6 20 MSI M 1 1 A OBJ
22 T 5 What is the genesis
block?
Any
The last
block
block
creat
created
A ed by B in the
the
Blockch
found
ain
er
The The
first first
block transac
C of a D tion in
Block each
Chain block
Answer is : C
7 20 MSI M 1 1 A OBJ
22 T 5 ___ hosts the software
needed for transaction
initiation, validation,
mining, block creation,
and smart contract
execution.
Extern
al
A Accou B EVM
nt
C Ethere D Smar
um full t
node Contr
act
Answer is : C
8 20 MSI M 1 1 A OBJ
22 T 5 Blockchain is a peer-
to-peer
_____________
distributed ledger
technology that makes
the records of any
digital asset
transparent and
unchangeable
Decent Dema
A ralized B nding
Popul
C Secure D ar
Answer is : A
9 20 MSI M 1 1 A OBJ
22 T 5 Blockchain has ____
versions
A 2 B 3
C 4 D 5
Answer is : B
10 20 MSI M 1 1 A OBJ
22 T 5 Transaction 0 in every
block of the bitcoin
blockchain________.
A Is for B Does
paying not
the have
miner any
input
fees
UTXO
Is called
the All of
coinbas the
C e D abov
transac e
tion
Answer is : D
11 20 MSI M 1 1 A OBJ
22 T 5 What is the genesis
block?
The
Any
last
block
block
create
create
A d by B d in
the
the
found
Blockc
er
hain
The The
first first
block transac
C of a D tion in
Blockc each
hain block
Answer is : C
12 20 MSI M 1 1 A OBJ
22 T 5 __________ receive
verify, gather and
execute transactions.
Min
Smart
er
A node B Contrac
ts
s
Light Ethereu
C wall D m full
ets node
Answer is : A
13 20 MSI M 1 1 A OBJ
22 T 5 BATM stands for
_____
Bounde
Broa
d access
dcas
A transacti B t
on
ATM
machine
Bloc
Bitcoin kchai
C ATM D n
ATM
Answer is : C
14 20 MSI M 1 1 A OBJ
22 T 5 Smart Contract
characteristics do not
include:
Fast
and
Altera
A ble B cost-
effectiv
e
C A high D Transp
degre arency
e of
accura
cy
Answer is : A
15 20 MSI M 1 1 A OBJ
22 T 5 What type of hash is
used when there is a
fixed number of items
to be hashed, such as
the items in a block
header, and we are
verifying the
composite block
integrity?
Tree-
Com
structu
A red B plex
hash
Hash
Simple Eithe
C Hash D r
Answer is : C
16 20 MSI M 1 1 A OBJ
22 T 5 What type of hash
function is used, when
there is a variable
number of items to be
hashed, such as the
many state changes in
a block?
Tree-
Com
structu
A red B plex
hash
Hash
Simple Eithe
C Hash D r
Answer is : A
17 20 MSI M 1 1 A OBJ
22 T 5 The transaction
Merkle Tree root value
in a Bitcoin block is
calculated using
Previ
Hash of ous
A transac B block
tions s
hash
None
Numbe
of
r of
C transac D the
abov
tions
e
Answer is : A
18 20 MSI M 1 1 A OBJ
22 T 5 What is a DApp?
A type
of A
A crypto B condi
curren ment
cy
A
A type decen
of tralize
C blockc D d
hain applic
ation
Answer is : D
19 20 MSI M 1 1 A OBJ
22 T 5 Hash identifying each
block in the
blockchain is
generated using which
of the following
cryptographic
algorithm?
SHA1 SHA25
A 28 B
6
Both None
C a and D of the
b above
Answer is : B
20 20 MSI M 1 1 A OBJ
22 T 5 How often does the
Bitcoin ledger
reconcile?
Every 3
Every
A day B month
s
Every Every
3 10
C minut D minute
es s
Answer is : B
21 20 MSI M 1 1 A OBJ
22 T 5 What is a smart
contract?
A Programs B Onl
stored on ine
a co
blockchai ntr
n that run act
when
predeter
mined
conditions
are met
All
the
Digital
C contract D ab
ov
e
Answer is : A
22 20 MSI M 1 1 A OBJ
22 T 5 Blockchain is a ______
?
Push Pull
A technol B techn
ogy ology
Both
None
push
of the
C and pull D abov
technol
e
ogy
Answer is : A
23 20 MSI M 1 1 A OBJ
22 T 5 What is a miner?
An
algorit
hm
A type that
of predict
A blockc B s the
hain next
part of
the
chain
A Compu
perso ters
n that
doing validat
calcul e and
C ations D proces
to s
verify blockc
a hain
transa transac
ction tions
Answer is : D
24 20 MSI M 1 1 A OBJ
22 T 5 Where is a
Blockchain’s central
server?
Locat
ed
Where with
the the
A blockch B owne
ain is r of
created the
serve
r
There is
no
central Order
C server, D ed
it is Node
distribu
ted
Answer is : C
25 20 MSI M 1 1 A OBJ
22 T 5 Transactions per
second (TPS) for
Proof-of-Work
Blockchain are
approximate?
175
K
24K per
A second B per
sec
ond
Only
limited to 7-
the 15
C number D per
of nodes sec
on the ond
network
Answer is : D
26 20 MSI M 1 1 A OBJ
22 T 5 The height of the
block is the ____ in
the chain between it
and the genesis block.
Meta
Numb
data
A that B er of
blocks
is
Size of
Merkl the
C e tree D memor
hash y
cache
Answer is : B
27 20 MSI M 1 1 A OBJ
22 T 5 Which of the following
problems did
Blockchain solve for
cryptocurrencies?
Doub
Anony le
A mity B Spen
ding
None
Destina
of
tion of
C currenc D the
abov
ies
e
Answer is : B
28 20 MSI M 1 1 A OBJ
22 T 5 Blockchain does not
provide?
Secur Immuta
A ity B bility
Fast
Fault
transac
C toler D tion
ance
time
Answer is : D
29 20 MSI M 1 1 A OBJ
22 T 5 A contract in size is
restricted to,
24576 1 Kilo
A Bytes B Bytes
23575 No
C Bytes D limit
Answer is : A
30 20 MSI M 1 1 A OBJ
22 T 5 What is the purpose
of a Nonce?
Follo
A Hash
ws
A noun B Functio
n
s
Send
Prev Informa
ents tion to
Doub the
C le D Blockch
Spen ain
ding Networ
k
Answer is : C
31 20 MSI M 2 2 A OBJ
22 T 5 How many peers do
you need to endorse a
transaction?
1
A 0 B 3
It depends
C 5 D on chain
code logic.
Answer is : D
32 20 MSI M 2 2 A OBJ
22 T 5 Users can use
__________ to design
assets.
Smart Busine
A contra B ss
ct Chain
Busine
Blockc
C ss D hain
rules
Answer is : A
33 20 MSI M 2 2 A OBJ
22 T 5 What is the first fully
supported language to
write chain code?
Java
A Java B
Script
Gola Pytho
C D
ng n
Answer is : C
34 20 MSI M 2 2 A OBJ
22 T 5 Which of these is
another part of
Hyperledger Fabric
Ledger?
Transa
Snapsh
A ction B ots
Logs
Statel Memb
C ess D ership
data logs
Answer is : A
35 20 MSI M 2 2 A OBJ
22 T 5 By default, the ledger
system in Hyperledger
Fabric uses this
database.
A MyS B Couch
QL DB
MS Level
C D
SQL DB
Answer is : D
36 20 MSI M 2 2 A OBJ
22 T 5 The five elements of
blockchain are
distribution,
encryption,
immutability,
tokenization and:
Trans
Authori
A paren B zation
cy
Decent
Efficie
C ncy D ralizati
on
Answer is : D
37 20 MSI M 2 2 A OBJ
22 T 5 What can an IT leader
use enterprise
blockchain for?
Impro
Stream ve
line financi
A supply B al
chains transa
ctions
C Provid D All of
e the
identit above
y
manag
ement
Answer is : D
38 20 MSI M 2 2 A OBJ
22 T 5 What are some of the
advantages of
implementing
enterprise blockchain?
Expand
business-
to-
Red
business
uce
and
A IT B business-
cost
to-
s
consume
r
networks
Ena
ble
new All of the
C pro D above
duct
s
Answer is : D
39 20 MSI M 2 2 A OBJ
22 T 5 What feature about
enterprise blockchain
is accurate?
Has
Lowest
trust
A transacti B prob
on
lems
C Requires D Is
no ener
change gy
manage effici
ment ent
Answer is : B
40 20 MSI M 2 2 A OBJ
22 T 5 What is one of the
challenges of
permissioned, also
known as private or
enterprise,
blockchain?
Spe Auditab
A B
ed ility
Secu Access
C D
rity control
Answer is : B
41 20 MSI M 2 2 A OBJ
22 T 5 What areas of
cybersecurity does
blockchain have the
potential to improve?
Buildin Paym
g ent
A Securit B histor
y y
Passwo
rd Resili
C comple D ence
xity
Answer is : D
42 20 MSI M 2 2 A OBJ
22 T 5 Blockchain has the
potential to support
the following
enterprise goals
except:
Unc
over
Address
insig
A hts B a skills
gap
data
s
Boost
personal
Pro
commun
mot
ication
e
C trace D between
supplier
abilit
s and
y
produce
rs
Answer is : B
43 20 MSI M 2 2 A OBJ
22 T 5 What are essential
skills a blockchain
developer should
have?
A Official B Famili
asset arity
registr of
y, blockc
voting hain
facilita archite
tion, cture,
back- found
office ation
functio in
ns crypto
graphy
,
profici
ency
in
comm
on
progra
mming
langua
ges
Found
ation
in data
structu
res,
web
develo
Both B
C pment D and C
,
unders
tandin
g of
smart
contra
cts
Answer is : D
44 20 MSI M 2 2 A OBJ
22 T 5 Blockchain is a
distributed______.
Ledg
A B Server
er
Syst compu
C D
em ter
Answer is : A
45 20 MSI M 2 2 A OBJ
22 T 5 _____ are a collection
of transactions
bundled together to
be added to a
blockchain.
Box
A B Blocks
es
Nod Algorit
C D
es hms
Answer is : B
46 20 MSI M 2 2 A OBJ
22 T 5 _____ contains hash
of previous block and
all the important
information required
by the block.
block block
A metad B head
ata er
block
C footer D chain
Answer is : B
47 20 MSI M 2 2 A OBJ
22 T 5 What is the total
number of bitcoins
that can ever exist?
100 1
A millio B millio
n n
21
21
C D millio
billion
n
Answer is : D
48 20 MSI M 2 2 A OBJ
22 T 5 _____ are a set of
rules that verify and
add transactions to a
blockchain
Conse
Mathe
nsus
matical
A formul B mech
anism
as
s
C Blocks D Laws
Answer is : B
49 20 MSI M 2 2 A OBJ
22 T 5 Which of these is a
distributed ledger that
doesnot utilize
transaction blocks?
Bitco
A Ripple B
in
Ethere R3Co
C D
um rda
Answer is : D
50 20 MSI M 2 2 A OBJ
22 T 5 Which type of
blockchains are
controlled by a
particular person or
organization?
pub person
A B
lic al
priv consor
C D
ate tium
Answer is : C
51 20 MSI M 2 2 A OBJ
22 T 5 What does C stands
for in CAP theorem?
Cap
Comp
A B acit
utation
y
Consis Cor
C D
tency rect
Answer is : C
52 20 MSI M 2 2 A OBJ
22 T 5 One bitcoin could be
divided down to
____ decimal point?
A 8 B 10
C 12 D 14
Answer is : A
53 20 MSI M 2 2 A OBJ
22 T 5 Who is the founder
of Hyperledger
fabric?
G
oo
A Linux B gl
e
Ethereum
R
C Develope D3
rs
Answer is : A
54 20 MSI M 2 2 A OBJ
22 T 5 How many types of
blockchains have
emerged after
bitcoin introduced
blockchain to the
world?
A 1 B 2
C 3 D 4
Answer is : C
55 20 MSI M 2 2 A OBJ
22 T 5 The first smart
contract platform is
_______.
Ethe
Bitcoi
A B reu
n
m
Hyper Ripp
C D
ledger le
Answer is : B
56 20 MSI M 2 2 A OBJ
22 T 5 The three concepts
used to explain the
foundation of
blockchain are
________________
__
Physi
Ledge cal
r, Asset
Bitcoi ,
ns, Digit
A Digita B al
l Asset
Identit s,
y. Ledg
er
Busin
ess
Netw Ledg
ork, er,
Digita Bitco
C l D ins,
Assets Ledg
, er
Ledge
r
Answer is : C
57 20 MSI M 2 2 A OBJ
22 T 5 Bankchain is an
example of _______
Priv
A ate B Public
Fed Both
C erat D A and
ed B
Answer is : A
58 20 MSI M 2 2 A OBJ
22 T 5 Blockchain which is
popularly known as
‘for the people, by
the people and of the
people” is
___________.
Priva Publ
A B
te ic
Both
Feder A
C D
ated and
B
Answer is : B
59 20 MSI M 2 2 A OBJ
22 T 5 Which of the
following
abstractions in
Hyperledger Fabric
provide
confidentiality to
individual ledgers?
Ord
erin
A g B Peers
servi
ces
Endors
Cha
ement
C nnel D Policie
s
s
Answer is : C
60 20 MSI M 2 2 A OBJ
22 T 5 Fabric CA or
External CA can
provide identities for
which of the
following?
Admini Pee
A strators B rs
All
the
C Orders D abo
ve
Answer is : D
61 20 MSI M 3 3 A OBJ
22 T 5 Which of the
following is
popularly used for
storing bitcoins
Poc Wal
A B
ket let
Stac
C Box D
k
Answer is : B
62 20 MSI M 3 3 A OBJ
22 T 5 Which site run by
Ross Ulbricht was
closed by the FBI
for letting people
buy drugs with
Bitcoin?
Lac
Silk
A B e
Road
Place
Dar
Silk
k
C Stree D
Alle
t
y
Answer is : A
63 20 MSI M 3 3 A OBJ
22 T 5 Which of these US
states introduced the
BitLicense
regulation for
cryptocurrency
companies?
Ne
w Califo
A B
Yor rnia
k
Te Washi
C D
xas ngton
Answer is : A
64 20 MSI M 3 3 A OBJ
22 T 5 What is the name of
the famous Bitcoin
exchange from
Japan that collapsed
in 2014?
Blockc Tra
A hain.inf B deh
o ill
Bit
Mt.
C Gox D sta
mp
Answer is : C
65 20 MSI M 3 3 A OBJ
22 T 5 What does the block
in the blockchain
consist of?
A
Transa Has
A ction B h
data poin
t
All
A
of
C Timest D thes
amp
e
Answer is : D
66 20 MSI M 3 3 A OBJ
22 T 5 What is not a ledger
type considered by
users in Blockchain?
Distr
Decen
ibute
tralize
Ad B d
Ledg
Ledger
er
Bot
None
ha
C and D of
these
b
Answer is : D
67 20 MSI M 3 3 A OBJ
22 T 5 What is the impact
of information leak
for an organization?
Los
s of
trust
Loss in
A profit B in
cust
omer
s
Cut
down
the
All
reputat
C ion of D of
these
the
organi
zation
Answer is : D
68 20 MSI M 3 3 A OBJ
22 T 5 What time did
Bitcoin Network
Start?
Janu Septe
A ary B mber
2009 2001
Nove Janua
C mber D ry
2008 2010
Answer is : A
69 20 MSI M 3 3 A OBJ
22 T 5 How many new
Bitcoins are created
every day?
3
2200
6
A Except of B 0
leap year
0
5
0
C 7200 D
0
0
Answer is : B
70 20 MSI M 3 3 A OBJ
22 T 5 What is the initial
application for
which Blockchain
was designed?
Peer- Res
to-peer earc
A finance B h
applicat Proj
ion ect
Open
source No
finance ne
C softwar D of
e to thes
connect e
Banks
Answer is : D
71 20 MSI M 3 3 A OBJ
22 T 5 A hybrid blockchain
has a combination of
.................. features.
A Cent B Dece
ralize ntraliz
d ed
Both
Centr
alized None
C & D of
Dece above
ntrali
zed
Answer is : C
72 20 MSI M 3 3 A OBJ
22 T 5 The Some of the
largest, most known
public blockchains
are
the ...........................
Bitc
Ether
oin
eum
A bloc B blockc
kchai
hain
n
Both
Hyb Bitcoi
rid n&
C bloc D Ethere
kchai um
n blockc
hain
Answer is : D
73 20 MSI M 3 3 A OBJ
22 T 5 What is nonce in
blockchain?
Foll A
ows Hash
A noun B Functi
s on
C Pre D Send
vent Inform
s ation
Dou to the
ble Blockc
hain
Spen
Networ
ding
k
Answer is : C
74 20 MSI M 3 3 A OBJ
22 T 5 What is Proof of
Stake?
A
certifi
How
cate
priva
neede
te
A keys B d to
use
are
the
made
blockc
hain
A A
pass transa
word ction
need and
C ed to D block
acces verific
s an ation
exch protoc
ange ol
Answer is : D
75 20 MSI M 3 3 A OBJ
22 T 5 Where do you keep
your
cryptocurrency?
Flopp
Walle
Ay B t
Disk
In
Bank
your
C accou D pocke
nt
t
Answer is : B
76 20 MSI M 3 3 A OBJ
22 T 5 Which of the
following is not a
blockchain
component?
certifica
Le
te
A B dg
authorit
er
y
Ha
C Wallet D
sh
Answer is : A
77 20 MSI M 3 3 A OBJ
22 T 5 Which of the
following is true
about the bitcoin
scripting language?
support sta
infinite ck
A time/me B bas
mory ed
No
ne
Turing
of
C complet D the
e
abo
ve
Answer is : B
78 20 MSI M 3 3 A OBJ
22 T 5 P2P stand for
________
Peer Passw
A to B ord to
Peer Private
Priva
None
te to
C Publi D of the
above
c
Answer is : A
79 20 MSI M 3 3 A OBJ
22 T 5 The alternatives to
POW are ______
Delegat
Proo
ed
f of
A Proof B stak
Of
e
Stake
Non
e of
Both A
C and B D the
abo
ve
Answer is : C
80 20 MSI M 3 3 A OBJ
22 T 5 _______ provides
the power to the
Ethereum Virtual
Machine.
A Gas B Ether
Both
None
A
C D of the
and
above
B
Answer is : A
81 20 MSI M 3 3 A OBJ
22 T 5 POW stands
for__________
Proof Proof
A of B of
Work Word
Proof
None
of
C Wisd D of the
above
om
Answer is : A
82 20 MSI M 3 3 A OBJ
22 T 5 Nakamoto
implemented the
bitcoin software as
open-source code.
A 1 B
Can
Can
be
C D not
true or
say
false
Answer is : A
83 20 MSI M 3 3 A OBJ
22 T 5 To claim the reward,
a special transaction
called a?
Onlin
Nonc e
A e B walle
ts
Hard
Coin
C ware D base
wallet
Answer is : D
84 20 MSI M 3 3 A OBJ
22 T 5 Are blockchain fully
public?
A Yes B No
It
None of
dep
C end D the
above
s
Answer is : C
85 20 MSI M 3 3 A OBJ
22 T 5 What is the process
of creating new
bitcoins popularly
known as
Findi Pann
A B
ng ing
Sour Mini
C D
cing ng
Answer is : D
86 20 MSI M 3 3 A OBJ
What is hash
22 T 5
function?
U
T
A A fork B X
O
Takes an
input of
any
length
and
returns a G
C fixed- D as
length
string of
numbers
and
letters
Answer is : C
87 20 MSI M 3 3 A OBJ
22 T 5 One bitcoin could be
divided down
to __________
decimal point
A 5 B 6
C 7 D 8
Answer is : D
88 20 MSI M 3 3 A OBJ
22 T 5 A transaction
without verification
in bitcoin could be
fastest accomplished
in how much time?
Pan
Instant
A B nin
aneous
g
Mi
Sourci
C D nin
ng
g
Answer is : A
89 20 MSI M 3 3 A OBJ
22 T 5 __________ records
all the transactions
in a blockchain.
Blo
A Try B
ck
Funct Inp
C D
ion ut
Answer is : B
90 20 MSI M 3 3 A OBJ
22 T 5 Which platform
could gain its best
use case from the
supply chain
industry?
bitcoi block
B
n chain
Hyerl findi
D
edger ng
Answer is : C
91 20 MSI M 4 4 A OBJ
22 T 5 Blockchain which is
popularly known as
‘for the people, by
the people and of the
people” is
Priv Publi
A B
ate c
Both
None
a
C D of the
and
above
b
Answer is : B
92 20 MSI M 4 4 A OBJ
22 T 5 Mainly how many
types of blockchains
have emerged after
bitcoin introduced
blockchain to the
world?
A 1 B 2
C 3 D 4
Answer is : C
93 20 MSI M 4 4 A OBJ
22 T 5 Bankchain is an
example
of__________
Priv
A ate B Public
Both
None
a
C and D of the
above
b
Answer is : A
94 20 MSI M 4 4 A OBJ
22 T 5 Digital assets must
always be tangible
A1 B
It
None of
dep
C end D the
above
s
Answer is : B
95 20 MSI M 4 4 A OBJ
22 T 5 Bitcoin network
would make it
impossible to bypass
the traditional
financial
intermediaries
A 1 B
It None
C depe D of the
nds above
Answer is : B
96 20 MSI M 4 4 A OBJ
22 T 5 Consortium
Blockchain provides
a faster and more
protected ecosystem
than a Private
Blockchain?
A 1 B
It None
C depe D of the
nds above
Answer is : A
97 20 MSI M 4 4 A OBJ
22 T 5 Private Blockchain
is a de-centralized
type of Blockchain?
A 1 B
It None
C depe D of the
nds above
Answer is : B
98 20 MSI M 4 4 A OBJ
22 T 5 BlockChain
provides _________
_ a database of every
transaction involving
value
Open Close
decen Decen
A traliz B tralize
ed d
Open Close
C centra D centra
lized lized
Answer is : A
99 20 MSI M 4 4 A OBJ
22 T 5 The value of coins
( litecoin, bitcoin) is
the same at a
particular time
A 1 B
It None
C depe D of the
nds above
Answer is : B
10 20 MSI M 4 4 A OBJ
0 22 T 5 The two types of
cryptography
are_________ .
D
i
A Logic B g
it
Asymmet V
ric and al
C Symmetri Du
c e
Answer is : C
10 20 MSI M 4 4 A OBJ
1 22 T 5 Name the first
cryptocurrency with
computing power
contribution?
Gridc Coi
A B
oin n
Bitc
C Map D
oin
Answer is : A
10 20 MSI M 4 4 A OBJ
2 22 T 5 Encrypted text is
also known as
Plain Ciphe
A Text B r Text
Publi Privat
C c key D e Key
Answer is : B
10 20 MSI M 4 4 A OBJ
3 22 T 5 Which among the
following is the most
flexible
cryptocurrency?
Eth Ledg
A B
er er
Wal
C D Hash
let
Answer is : A
10 20 MSI M 4 4 A OBJ
4 22 T 5 The output of
Hashing is popularly
known as
Conn Digi
A B
ect t
Dige Nu
C D
st mer
Answer is : C
10 20 MSI M 4 4 A OBJ
5 22 T 5 Bitcoins can be
purchased in
exchange for
services
A 1 B
It None
C dep D of the
ends above
Answer is : A
10 20 MSI M 4 4 A OBJ
6 22 T 5 The sender and the
receiver in a
transaction provide
miners with a fee
A 1 B
C It D None
depe of the
nds above
Answer is : B
10 20 MSI M 4 4 A OBJ
7 22 T 5 Which platform
could gain its best
use case from the
financial service
industry?
R3 R4
A Cord B Cord
a a
R5 R6
C Cord D Cord
a a
Answer is : A
10 20 MSI M 4 4 A OBJ
8 22 T 5 Ether provides
greater flexibility
than Bitcoin does
A 1 B
It None
C dep D of the
ends above
Answer is : A
10 20 MSI M 4 4 A OBJ
9 22 T 5 The first smart
contract platform is
Bitc
Ethere
oin
um
A bloc B blockc
kchai
hain
n
Both
Hyb Bitcoi
rid n&
C bloc D Ethere
kchai um
n blockc
hain
Answer is : B
11 20 MSI M 4 4 A OBJ
0 22 T 5 Which of the
following
platform(s) provides
a modular
architecture?
Flop
Hyper
A B py
ledger
Disk
Ban
k
C Wallet D
acco
unt
Answer is : A
11 20 MSI M 4 4 A OBJ
1 22 T 5 New bitcoins are
released every time a
transaction is
verified
A 1 B
It None
C depe D of the
nds above
Answer is : A
11 20 MSI M 4 4 A OBJ
2 22 T 5 Both ________ and
________
automatically check
your previous
transactions to make
sure you have
enough bitcoins to
send
Led Bitcoi
ger n
and Netwo
A your B rk and
Wall your
et Wallet
Min
ers
C and D Digit
User
s
Answer is : A
11 20 MSI M 4 4 A OBJ
3 22 T 5 _______ is
popularty known as
DLT with
difference.
Ethe
Hyper
A B reu
ledger
m
R3 Eth
C D
corda er
Answer is : B
11 20 MSI M 4 4 A OBJ
4 22 T 5 Name of the first
cryptocurrency with
computing power
contribution?
Grid Litec
A B
coin oin
Rippl Bitc
C D
e oin
Answer is : A
11 20 MSI M 4 4 A OBJ
5 22 T 5 Which among the
following are the
advantages of using
Bitcoin?
A Negli B Can
gible be
trans used
actio to
n fee transf
er
mone
y
anywh
ere in
the
world
Your
accou
All
nt
the
C cann D option
ot be
s
froze
n
Answer is : D
11 20 MSI M 4 4 A OBJ
6 22 T 5 Bitcoin is
____________.
Peer
Public
to
to
publi
Ac B peer
curren
curre
cy
ncy
Peer Public
to to
C peer D public
curre curren
ncy cy
Answer is : C
11 20 MSI M 4 4 A OBJ
7 22 T 5 Currencies other
than Bitcoin such as
Litecoin and Dash
are popularly known
as _________.
Cryp
Altcurr
A tocoi B ency
ns
Crypto
Altc
C oins D curren
cy
Answer is : C
11 20 MSI M 4 4 A OBJ
8 22 T 5 In asymmetric key
cryptography, the
private key is kept
by __________.
Every send
one in er
A the B and
netwo recei
rk ver
receiv send
C er D er
Answer is : C
11 20 MSI M 4 4 A OBJ
9 22 T 5 HASH can be used
to validate the input.
Sometime
A 1 B
s yes
C D None
Answer is : A
12 20 MSI M 4 4 A OBJ
0 22 T 5 Crypto analysis is
used ___________.
To find To
some incr
insecurit eas
A y in a B e
cryptogr the
aphic spe
scheme ed
non
to e of
C encrypt D the
the data opti
ons
Answer is : C
12 20 MSI M 5 5 A OBJ
1 22 T 5 In which of the
following, a person
is constantly
followed/chased by
another person or
group of several
peoples?
Phis Bulli
A B
hing ng
Ident
Stalk
C D ity
ing
theft
Answer is : C
12 20 MSI M 5 5 A OBJ
2 22 T 5 Which one of the
following can be
considered as the
class of computer
threats?
Dos
Phish
A Attac B
ing
k
Both
Solic A
C D
iting and
C
Answer is : A
12 20 MSI M 5 5 A OBJ
3 22 T 5 Which of the
following is
considered as the
unsolicited
commercial email?
Vi Malwar
A B
rus e
All of
Sp
C D the
am
above
Answer is : C
12 20 MSI M 5 5 A OBJ
4 22 T 5 Which of the
following usually
observe each activity
on the internet of the
victim, gather all
information in the
background, and
send it to someone
else?
Mal Spyw
A B
ware are
All of
Adw
C D the
are
above
Answer is : B
12 20 MSI M 5 5 A OBJ
5 22 T 5 _______ is a type of
software designed to
help the users
computer detect
viruses and avoid
them.
Mal Adw
A B
ware are
Both
Anti B
C D
virus and
C
Answer is : C
12 20 MSI M 5 5 A OBJ
6 22 T 5 Which one of the
following is a type
of antivirus
program?
Quic
Mcaf
A k B
ee
heal
All of
Kasp
C D the
ersky
above
Answer is : D
12 20 MSI M 5 5 A OBJ
7 22 T 5 It can be a software
program or a
hardware device that
filters all data
packets coming
through the internet,
a network, etc. it is
known as
the_______:
Antiv Fire
A B
irus wall
Cook Mal
C D
ies ware
Answer is : B
12 20 MSI M 5 5 A OBJ
8 22 T 5 Which of the
following refers to
exploring the
appropriate, ethical
behaviors related to
the online
environment and
digital media
platform?
Cybe
Cyber
A low B rethi
cs
Cyber Cybe
C securit D rsafet
y y
Answer is : B
12 20 MSI M 5 5 A OBJ
9 22 T 5 Which of the
following refers to
the violation of the
principle if a
computer is no more
accessible?
A Acce B Confid
ss entialit
contr y
ol
Avai All of
C labili D the
ty above
Answer is : C
13 20 MSI M 5 5 A OBJ
0 22 T 5 Which one of the
following refers to
the technique used
for verifying the
integrity of the
message?
Digit Decry
al ption
A B
sign algorit
ature hm
Messa
Prot
C ocol D ge
Digest
Answer is : D
13 20 MSI M 5 5 A OBJ
1 22 T 5 Which one of the
following usually
used in the process
of Wi-Fi-hacking?
Aircr
Wires
A ack- B hark
ng
All of
Nort
C on D the
above
Answer is : A
13 20 MSI M 5 5 A OBJ
2 22 T 5 Which of the
following port and
IP address scanner
famous among the
users?
A Cain B Angry
and IP
Abe Scann
l er
Snor Etterc
C D
t ap
Answer is : B
13 20 MSI M 5 5 A OBJ
3 22 T 5 In ethical hacking
and cyber security,
there are _______
types of scanning:
A 1 B 2
C 3 D 4
Answer is : C
13 20 MSI M 5 5 A OBJ
4 22 T 5 Which of the
following is not a
type of scanning?
Xmas Clou
A Tree B d
Scan scan
SYN
Null
C Scan D Steal
th
Answer is : B
13 20 MSI M 5 5 A OBJ
5 22 T 5 In system hacking,
which of the
following is the most
crucial activity?
Inform Cove
ation ring
A gatheri B track
ng s
C Cracki D Non
ng e of
passw the
abov
ords
e
Answer is : C
13 20 MSI M 5 5 A OBJ
6 22 T 5 Which of the
following are the
types of scanning?
Networ Port
k, ,
vulnera net
bility, wor
A and B k,
port and
scannin serv
g ices
Client, Non
Server, e of
C and D the
networ abo
k ve
Answer is : A
13 20 MSI M 5 5 A OBJ
7 22 T 5 Which one of the
following is actually
considered as the
first computer virus?
Sass Blast
A B
er er
Both
Cree
C D A and
per
C
Answer is : C
13 20 MSI M 5 5 A OBJ
8 22 T 5 To protect the
computer system
against the hacker
and different kind of
viruses, one must
always keep
_________ on in the
computer system.
Antiv Fire
A B
irus wall
Vlc
Scri
C playe D
pt
r
Answer is : B
13 20 MSI M 5 5 A OBJ
9 22 T 5 Code Red is a type
of ________
A
An
photo
Antiv
editin
A irus B g
Progr
softw
am
are
A
A video
comp editin
C uter Dg
virus softw
are
Answer is : C
14 20 MSI M 5 5 A OBJ
0 22 T 5 Which of the
following can be
considered as the
elements of cyber
security?
Appli Opera
cation tional
A Secur B Secur
ity ity
Netw
All of
ork
C Secur D the
above
ity
Answer is : D
14 20 MSI M 5 5 A OBJ
1 22 T 5 Which one of the
following is also
referred to as
malicious software?
Bad
Malicio
A usware B war
e
Mal
Ilegalw
C are D war
e
Answer is : D
14 20 MSI M 5 5 A OBJ
2 22 T 5 In Wi-Fi Security,
which of the
following protocol is
more used?
W
A B WPA2
PA
Both
W
C D A and
PS
C
Answer is : B
14 20 MSI M 5 5 A OBJ
3 22 T 5 The response time
and transit time is
used to measure the
____________ of a
network.
Secu Longe
A rity B vity
Relia Perfor
C bility D mance
Answer is : D
14 20 MSI M 5 5 A OBJ
4 22 T 5 Which of the
following factor of
the network gets
hugely impacted
when the number of
users exceeds the
networks limit?
Relia Perfor
A bility B mance
Secu Longe
C rity D vity
Answer is : D
14 20 MSI M 5 5 A OBJ
5 22 T 5 In the computer
networks, the
encryption
techniques are
primarily used for
improving the
________
Securi Relia
A B
ty bility
Perfor Long
C mance D evity
Answer is : A
14 20 MSI M 5 5 A OBJ
6 22 T 5 When was the first
computer virus
created?
197 197
A B
0 1
197 196
C D
2 9
Answer is : B
14 20 MSI M 5 5 A OBJ
7 22 T 5 Which of the
following is
considered as the
worlds first antivirus
program?
Cree Reape
A B
per r
C Tink D Ray
ered Tomli
nson
Answer is : B
14 20 MSI M 5 5 A OBJ
8 22 T 5 Which one of the
following principles
of cyber security
refers that the
security mechanism
must be as small and
simple as possible?
Econo
Ope
my of
n-
A Desi B the
Mecha
gn
nism
Leas Fail-
t safe
C privi D Defaul
lege ts
Answer is : B
14 20 MSI M 5 5 A OBJ
9 22 T 5 Which of the
following principle
of cyber security
restricts how
privileges are
initiated whenever
any object or subject
is created?
Open
Least
-
A privil B
Desi
ege
gn
None
Fail-
of
safe
C D the
Defau
abov
lts
e
Answer is : C
15 20 MSI M 5 5 A OBJ
0 22 T 5 Which of the
following can also
consider as the
instances of Open
Design?
CS DVD
A B
S Player
Both
Onl
C D A and
yA
B
Answer is : D