0% found this document useful (0 votes)
11 views

M5 -PG - Block Chain Client - 22 Batch II MSC IT

The document consists of a series of multiple-choice questions related to blockchain technology, covering topics such as its characteristics, components, and functionalities. Each question is followed by four options, with the correct answer indicated. The content serves as a quiz or assessment tool for individuals seeking to test their knowledge of blockchain concepts.

Uploaded by

balujerry257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

M5 -PG - Block Chain Client - 22 Batch II MSC IT

The document consists of a series of multiple-choice questions related to blockchain technology, covering topics such as its characteristics, components, and functionalities. Each question is followed by four options, with the correct answer indicated. The content serves as a quiz or assessment tool for individuals seeking to test their knowledge of blockchain concepts.

Uploaded by

balujerry257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 56

S.

S U
YE MA CHA SE Q.T
N U NI QUESTION
AR JOR PTER C. YPE
O B T

1 20 MSI M 1 1 A OBJ
22 T 5 Blockchain networks
are much _____ and
deal with no real
single point of failure.

Easie
Simple
B r to
r
scale

Conve Faste
D
nient r

Answer is : B

2 20 MSI M 1 1 A OBJ
22 T 5 What does P2P stand
for?

Produ
Peer to ct to
A Peer B Produ
ct

Passwo Peer
rd to to
C Passwo D Proce
rd ss

Answer is : A

3 20 MSI M 1 1 A OBJ
22 T 5 What does a block in a
Blockchain have?

Header
Bitcoi
&
A Digital B ns &
Input
ledger
Transa
Heade
ctions
r&
C & D Transa
Bitcoin
ction
s

Answer is : D

4 20 MSI M 1 1 A OBJ
22 T 5 What does UTXO
stand for?

Unspen
t
Unspe
Transac
nt
A Trade B tion
xeroxe
Offer
d
Output

Uniqu Unspen
e t
C Trans D Transac
action tion
Offer Output

Answer is : D

5 20 MSI M 1 1 A OBJ
22 T 5 Transaction 0 in every
block of the bitcoin
blockchain________.

Does
Is for
not
paying
have
A the B any
miner
input
fees
UTXO

C Is called D All
the the
coinbas Abov
e
transac e
tion

Answer is : D

6 20 MSI M 1 1 A OBJ
22 T 5 What is the genesis
block?

Any
The last
block
block
creat
created
A ed by B in the
the
Blockch
found
ain
er

The The
first first
block transac
C of a D tion in
Block each
Chain block

Answer is : C

7 20 MSI M 1 1 A OBJ
22 T 5 ___ hosts the software
needed for transaction
initiation, validation,
mining, block creation,
and smart contract
execution.

Extern
al
A Accou B EVM
nt

C Ethere D Smar
um full t
node Contr
act

Answer is : C

8 20 MSI M 1 1 A OBJ
22 T 5 Blockchain is a peer-
to-peer
_____________
distributed ledger
technology that makes
the records of any
digital asset
transparent and
unchangeable

Decent Dema
A ralized B nding

Popul
C Secure D ar

Answer is : A

9 20 MSI M 1 1 A OBJ
22 T 5 Blockchain has ____
versions

A 2 B 3

C 4 D 5

Answer is : B

10 20 MSI M 1 1 A OBJ
22 T 5 Transaction 0 in every
block of the bitcoin
blockchain________.

A Is for B Does
paying not
the have
miner any
input
fees
UTXO

Is called
the All of
coinbas the
C e D abov
transac e
tion

Answer is : D

11 20 MSI M 1 1 A OBJ
22 T 5 What is the genesis
block?

The
Any
last
block
block
create
create
A d by B d in
the
the
found
Blockc
er
hain

The The
first first
block transac
C of a D tion in
Blockc each
hain block

Answer is : C

12 20 MSI M 1 1 A OBJ
22 T 5 __________ receive
verify, gather and
execute transactions.
Min
Smart
er
A node B Contrac
ts
s

Light Ethereu
C wall D m full
ets node

Answer is : A

13 20 MSI M 1 1 A OBJ
22 T 5 BATM stands for
_____

Bounde
Broa
d access
dcas
A transacti B t
on
ATM
machine

Bloc
Bitcoin kchai
C ATM D n
ATM

Answer is : C

14 20 MSI M 1 1 A OBJ
22 T 5 Smart Contract
characteristics do not
include:

Fast
and
Altera
A ble B cost-
effectiv
e

C A high D Transp
degre arency
e of
accura
cy

Answer is : A

15 20 MSI M 1 1 A OBJ
22 T 5 What type of hash is
used when there is a
fixed number of items
to be hashed, such as
the items in a block
header, and we are
verifying the
composite block
integrity?

Tree-
Com
structu
A red B plex
hash
Hash

Simple Eithe
C Hash D r

Answer is : C

16 20 MSI M 1 1 A OBJ
22 T 5 What type of hash
function is used, when
there is a variable
number of items to be
hashed, such as the
many state changes in
a block?

Tree-
Com
structu
A red B plex
hash
Hash

Simple Eithe
C Hash D r
Answer is : A

17 20 MSI M 1 1 A OBJ
22 T 5 The transaction
Merkle Tree root value
in a Bitcoin block is
calculated using

Previ
Hash of ous
A transac B block
tions s
hash

None
Numbe
of
r of
C transac D the
abov
tions
e

Answer is : A

18 20 MSI M 1 1 A OBJ
22 T 5 What is a DApp?

A type
of A
A crypto B condi
curren ment
cy

A
A type decen
of tralize
C blockc D d
hain applic
ation

Answer is : D

19 20 MSI M 1 1 A OBJ
22 T 5 Hash identifying each
block in the
blockchain is
generated using which
of the following
cryptographic
algorithm?

SHA1 SHA25
A 28 B
6

Both None
C a and D of the
b above

Answer is : B

20 20 MSI M 1 1 A OBJ
22 T 5 How often does the
Bitcoin ledger
reconcile?

Every 3
Every
A day B month
s

Every Every
3 10
C minut D minute
es s

Answer is : B

21 20 MSI M 1 1 A OBJ
22 T 5 What is a smart
contract?

A Programs B Onl
stored on ine
a co
blockchai ntr
n that run act
when
predeter
mined
conditions
are met

All
the
Digital
C contract D ab
ov
e

Answer is : A

22 20 MSI M 1 1 A OBJ
22 T 5 Blockchain is a ______
?

Push Pull
A technol B techn
ogy ology

Both
None
push
of the
C and pull D abov
technol
e
ogy

Answer is : A

23 20 MSI M 1 1 A OBJ
22 T 5 What is a miner?

An
algorit
hm
A type that
of predict
A blockc B s the
hain next
part of
the
chain
A Compu
perso ters
n that
doing validat
calcul e and
C ations D proces
to s
verify blockc
a hain
transa transac
ction tions

Answer is : D

24 20 MSI M 1 1 A OBJ
22 T 5 Where is a
Blockchain’s central
server?

Locat
ed
Where with
the the
A blockch B owne
ain is r of
created the
serve
r

There is
no
central Order
C server, D ed
it is Node
distribu
ted

Answer is : C

25 20 MSI M 1 1 A OBJ
22 T 5 Transactions per
second (TPS) for
Proof-of-Work
Blockchain are
approximate?

175
K
24K per
A second B per
sec
ond

Only
limited to 7-
the 15
C number D per
of nodes sec
on the ond
network

Answer is : D

26 20 MSI M 1 1 A OBJ
22 T 5 The height of the
block is the ____ in
the chain between it
and the genesis block.

Meta
Numb
data
A that B er of
blocks
is

Size of
Merkl the
C e tree D memor
hash y
cache

Answer is : B

27 20 MSI M 1 1 A OBJ
22 T 5 Which of the following
problems did
Blockchain solve for
cryptocurrencies?
Doub
Anony le
A mity B Spen
ding

None
Destina
of
tion of
C currenc D the
abov
ies
e

Answer is : B

28 20 MSI M 1 1 A OBJ
22 T 5 Blockchain does not
provide?

Secur Immuta
A ity B bility

Fast
Fault
transac
C toler D tion
ance
time

Answer is : D

29 20 MSI M 1 1 A OBJ
22 T 5 A contract in size is
restricted to,

24576 1 Kilo
A Bytes B Bytes

23575 No
C Bytes D limit

Answer is : A

30 20 MSI M 1 1 A OBJ
22 T 5 What is the purpose
of a Nonce?

Follo
A Hash
ws
A noun B Functio
n
s

Send
Prev Informa
ents tion to
Doub the
C le D Blockch
Spen ain
ding Networ
k

Answer is : C

31 20 MSI M 2 2 A OBJ
22 T 5 How many peers do
you need to endorse a
transaction?

1
A 0 B 3

It depends
C 5 D on chain
code logic.

Answer is : D

32 20 MSI M 2 2 A OBJ
22 T 5 Users can use
__________ to design
assets.

Smart Busine
A contra B ss
ct Chain
Busine
Blockc
C ss D hain
rules

Answer is : A

33 20 MSI M 2 2 A OBJ
22 T 5 What is the first fully
supported language to
write chain code?

Java
A Java B
Script

Gola Pytho
C D
ng n

Answer is : C

34 20 MSI M 2 2 A OBJ
22 T 5 Which of these is
another part of
Hyperledger Fabric
Ledger?

Transa
Snapsh
A ction B ots
Logs

Statel Memb
C ess D ership
data logs

Answer is : A

35 20 MSI M 2 2 A OBJ
22 T 5 By default, the ledger
system in Hyperledger
Fabric uses this
database.

A MyS B Couch
QL DB

MS Level
C D
SQL DB

Answer is : D

36 20 MSI M 2 2 A OBJ
22 T 5 The five elements of
blockchain are
distribution,
encryption,
immutability,
tokenization and:

Trans
Authori
A paren B zation
cy

Decent
Efficie
C ncy D ralizati
on

Answer is : D

37 20 MSI M 2 2 A OBJ
22 T 5 What can an IT leader
use enterprise
blockchain for?

Impro
Stream ve
line financi
A supply B al
chains transa
ctions

C Provid D All of
e the
identit above
y
manag
ement

Answer is : D

38 20 MSI M 2 2 A OBJ
22 T 5 What are some of the
advantages of
implementing
enterprise blockchain?

Expand
business-
to-
Red
business
uce
and
A IT B business-
cost
to-
s
consume
r
networks

Ena
ble
new All of the
C pro D above
duct
s

Answer is : D

39 20 MSI M 2 2 A OBJ
22 T 5 What feature about
enterprise blockchain
is accurate?

Has
Lowest
trust
A transacti B prob
on
lems

C Requires D Is
no ener
change gy
manage effici
ment ent

Answer is : B

40 20 MSI M 2 2 A OBJ
22 T 5 What is one of the
challenges of
permissioned, also
known as private or
enterprise,
blockchain?

Spe Auditab
A B
ed ility

Secu Access
C D
rity control

Answer is : B

41 20 MSI M 2 2 A OBJ
22 T 5 What areas of
cybersecurity does
blockchain have the
potential to improve?

Buildin Paym
g ent
A Securit B histor
y y

Passwo
rd Resili
C comple D ence
xity

Answer is : D

42 20 MSI M 2 2 A OBJ
22 T 5 Blockchain has the
potential to support
the following
enterprise goals
except:

Unc
over
Address
insig
A hts B a skills
gap
data
s

Boost
personal
Pro
commun
mot
ication
e
C trace D between
supplier
abilit
s and
y
produce
rs

Answer is : B

43 20 MSI M 2 2 A OBJ
22 T 5 What are essential
skills a blockchain
developer should
have?

A Official B Famili
asset arity
registr of
y, blockc
voting hain
facilita archite
tion, cture,
back- found
office ation
functio in
ns crypto
graphy
,
profici
ency
in
comm
on
progra
mming
langua
ges

Found
ation
in data
structu
res,
web
develo
Both B
C pment D and C
,
unders
tandin
g of
smart
contra
cts

Answer is : D

44 20 MSI M 2 2 A OBJ
22 T 5 Blockchain is a
distributed______.

Ledg
A B Server
er

Syst compu
C D
em ter

Answer is : A

45 20 MSI M 2 2 A OBJ
22 T 5 _____ are a collection
of transactions
bundled together to
be added to a
blockchain.

Box
A B Blocks
es

Nod Algorit
C D
es hms

Answer is : B

46 20 MSI M 2 2 A OBJ
22 T 5 _____ contains hash
of previous block and
all the important
information required
by the block.

block block
A metad B head
ata er

block
C footer D chain

Answer is : B

47 20 MSI M 2 2 A OBJ
22 T 5 What is the total
number of bitcoins
that can ever exist?

100 1
A millio B millio
n n

21
21
C D millio
billion
n

Answer is : D
48 20 MSI M 2 2 A OBJ
22 T 5 _____ are a set of
rules that verify and
add transactions to a
blockchain

Conse
Mathe
nsus
matical
A formul B mech
anism
as
s

C Blocks D Laws

Answer is : B

49 20 MSI M 2 2 A OBJ
22 T 5 Which of these is a
distributed ledger that
doesnot utilize
transaction blocks?

Bitco
A Ripple B
in

Ethere R3Co
C D
um rda

Answer is : D

50 20 MSI M 2 2 A OBJ
22 T 5 Which type of
blockchains are
controlled by a
particular person or
organization?

pub person
A B
lic al

priv consor
C D
ate tium
Answer is : C

51 20 MSI M 2 2 A OBJ
22 T 5 What does C stands
for in CAP theorem?

Cap
Comp
A B acit
utation
y

Consis Cor
C D
tency rect

Answer is : C
52 20 MSI M 2 2 A OBJ
22 T 5 One bitcoin could be
divided down to
____ decimal point?

A 8 B 10

C 12 D 14

Answer is : A
53 20 MSI M 2 2 A OBJ
22 T 5 Who is the founder
of Hyperledger
fabric?

G
oo
A Linux B gl
e

Ethereum
R
C Develope D3
rs

Answer is : A
54 20 MSI M 2 2 A OBJ
22 T 5 How many types of
blockchains have
emerged after
bitcoin introduced
blockchain to the
world?

A 1 B 2
C 3 D 4

Answer is : C
55 20 MSI M 2 2 A OBJ
22 T 5 The first smart
contract platform is
_______.

Ethe
Bitcoi
A B reu
n
m

Hyper Ripp
C D
ledger le

Answer is : B
56 20 MSI M 2 2 A OBJ
22 T 5 The three concepts
used to explain the
foundation of
blockchain are
________________
__

Physi
Ledge cal
r, Asset
Bitcoi ,
ns, Digit
A Digita B al
l Asset
Identit s,
y. Ledg
er

Busin
ess
Netw Ledg
ork, er,
Digita Bitco
C l D ins,
Assets Ledg
, er
Ledge
r

Answer is : C
57 20 MSI M 2 2 A OBJ
22 T 5 Bankchain is an
example of _______

Priv
A ate B Public

Fed Both
C erat D A and
ed B

Answer is : A
58 20 MSI M 2 2 A OBJ
22 T 5 Blockchain which is
popularly known as
‘for the people, by
the people and of the
people” is
___________.

Priva Publ
A B
te ic

Both
Feder A
C D
ated and
B

Answer is : B
59 20 MSI M 2 2 A OBJ
22 T 5 Which of the
following
abstractions in
Hyperledger Fabric
provide
confidentiality to
individual ledgers?

Ord
erin
A g B Peers
servi
ces

Endors
Cha
ement
C nnel D Policie
s
s
Answer is : C
60 20 MSI M 2 2 A OBJ
22 T 5 Fabric CA or
External CA can
provide identities for
which of the
following?

Admini Pee
A strators B rs

All
the
C Orders D abo
ve

Answer is : D
61 20 MSI M 3 3 A OBJ
22 T 5 Which of the
following is
popularly used for
storing bitcoins

Poc Wal
A B
ket let

Stac
C Box D
k

Answer is : B
62 20 MSI M 3 3 A OBJ
22 T 5 Which site run by
Ross Ulbricht was
closed by the FBI
for letting people
buy drugs with
Bitcoin?

Lac
Silk
A B e
Road
Place

Dar
Silk
k
C Stree D
Alle
t
y

Answer is : A
63 20 MSI M 3 3 A OBJ
22 T 5 Which of these US
states introduced the
BitLicense
regulation for
cryptocurrency
companies?

Ne
w Califo
A B
Yor rnia
k

Te Washi
C D
xas ngton

Answer is : A
64 20 MSI M 3 3 A OBJ
22 T 5 What is the name of
the famous Bitcoin
exchange from
Japan that collapsed
in 2014?

Blockc Tra
A hain.inf B deh
o ill

Bit
Mt.
C Gox D sta
mp

Answer is : C
65 20 MSI M 3 3 A OBJ
22 T 5 What does the block
in the blockchain
consist of?

A
Transa Has
A ction B h
data poin
t

All
A
of
C Timest D thes
amp
e
Answer is : D
66 20 MSI M 3 3 A OBJ
22 T 5 What is not a ledger
type considered by
users in Blockchain?

Distr
Decen
ibute
tralize
Ad B d
Ledg
Ledger
er

Bot
None
ha
C and D of
these
b

Answer is : D
67 20 MSI M 3 3 A OBJ
22 T 5 What is the impact
of information leak
for an organization?

Los
s of
trust
Loss in
A profit B in
cust
omer
s

Cut
down
the
All
reputat
C ion of D of
these
the
organi
zation

Answer is : D
68 20 MSI M 3 3 A OBJ
22 T 5 What time did
Bitcoin Network
Start?

Janu Septe
A ary B mber
2009 2001
Nove Janua
C mber D ry
2008 2010

Answer is : A
69 20 MSI M 3 3 A OBJ
22 T 5 How many new
Bitcoins are created
every day?

3
2200
6
A Except of B 0
leap year
0

5
0
C 7200 D
0
0

Answer is : B
70 20 MSI M 3 3 A OBJ
22 T 5 What is the initial
application for
which Blockchain
was designed?

Peer- Res
to-peer earc
A finance B h
applicat Proj
ion ect

Open
source No
finance ne
C softwar D of
e to thes
connect e
Banks

Answer is : D
71 20 MSI M 3 3 A OBJ
22 T 5 A hybrid blockchain
has a combination of
.................. features.

A Cent B Dece
ralize ntraliz
d ed

Both
Centr
alized None
C & D of
Dece above
ntrali
zed

Answer is : C
72 20 MSI M 3 3 A OBJ
22 T 5 The Some of the
largest, most known
public blockchains
are
the ...........................

Bitc
Ether
oin
eum
A bloc B blockc
kchai
hain
n

Both
Hyb Bitcoi
rid n&
C bloc D Ethere
kchai um
n blockc
hain

Answer is : D
73 20 MSI M 3 3 A OBJ
22 T 5 What is nonce in
blockchain?

Foll A
ows Hash
A noun B Functi
s on

C Pre D Send
vent Inform
s ation
Dou to the
ble Blockc
hain
Spen
Networ
ding
k

Answer is : C
74 20 MSI M 3 3 A OBJ
22 T 5 What is Proof of
Stake?

A
certifi
How
cate
priva
neede
te
A keys B d to
use
are
the
made
blockc
hain

A A
pass transa
word ction
need and
C ed to D block
acces verific
s an ation
exch protoc
ange ol

Answer is : D
75 20 MSI M 3 3 A OBJ
22 T 5 Where do you keep
your
cryptocurrency?

Flopp
Walle
Ay B t
Disk

In
Bank
your
C accou D pocke
nt
t

Answer is : B
76 20 MSI M 3 3 A OBJ
22 T 5 Which of the
following is not a
blockchain
component?

certifica
Le
te
A B dg
authorit
er
y

Ha
C Wallet D
sh

Answer is : A
77 20 MSI M 3 3 A OBJ
22 T 5 Which of the
following is true
about the bitcoin
scripting language?

support sta
infinite ck
A time/me B bas
mory ed

No
ne
Turing
of
C complet D the
e
abo
ve

Answer is : B
78 20 MSI M 3 3 A OBJ
22 T 5 P2P stand for
________

Peer Passw
A to B ord to
Peer Private

Priva
None
te to
C Publi D of the
above
c

Answer is : A
79 20 MSI M 3 3 A OBJ
22 T 5 The alternatives to
POW are ______
Delegat
Proo
ed
f of
A Proof B stak
Of
e
Stake

Non
e of
Both A
C and B D the
abo
ve

Answer is : C
80 20 MSI M 3 3 A OBJ
22 T 5 _______ provides
the power to the
Ethereum Virtual
Machine.

A Gas B Ether

Both
None
A
C D of the
and
above
B

Answer is : A
81 20 MSI M 3 3 A OBJ
22 T 5 POW stands
for__________

Proof Proof
A of B of
Work Word

Proof
None
of
C Wisd D of the
above
om

Answer is : A
82 20 MSI M 3 3 A OBJ
22 T 5 Nakamoto
implemented the
bitcoin software as
open-source code.

A 1 B
Can
Can
be
C D not
true or
say
false

Answer is : A
83 20 MSI M 3 3 A OBJ
22 T 5 To claim the reward,
a special transaction
called a?

Onlin
Nonc e
A e B walle
ts

Hard
Coin
C ware D base
wallet

Answer is : D
84 20 MSI M 3 3 A OBJ
22 T 5 Are blockchain fully
public?

A Yes B No

It
None of
dep
C end D the
above
s

Answer is : C
85 20 MSI M 3 3 A OBJ
22 T 5 What is the process
of creating new
bitcoins popularly
known as

Findi Pann
A B
ng ing

Sour Mini
C D
cing ng

Answer is : D
86 20 MSI M 3 3 A OBJ
What is hash
22 T 5
function?

U
T
A A fork B X
O

Takes an
input of
any
length
and
returns a G
C fixed- D as
length
string of
numbers
and
letters

Answer is : C
87 20 MSI M 3 3 A OBJ
22 T 5 One bitcoin could be
divided down
to __________
decimal point

A 5 B 6

C 7 D 8

Answer is : D
88 20 MSI M 3 3 A OBJ
22 T 5 A transaction
without verification
in bitcoin could be
fastest accomplished
in how much time?

Pan
Instant
A B nin
aneous
g

Mi
Sourci
C D nin
ng
g

Answer is : A
89 20 MSI M 3 3 A OBJ
22 T 5 __________ records
all the transactions
in a blockchain.

Blo
A Try B
ck

Funct Inp
C D
ion ut

Answer is : B
90 20 MSI M 3 3 A OBJ
22 T 5 Which platform
could gain its best
use case from the
supply chain
industry?

bitcoi block
B
n chain

Hyerl findi
D
edger ng

Answer is : C
91 20 MSI M 4 4 A OBJ
22 T 5 Blockchain which is
popularly known as
‘for the people, by
the people and of the
people” is

Priv Publi
A B
ate c

Both
None
a
C D of the
and
above
b

Answer is : B
92 20 MSI M 4 4 A OBJ
22 T 5 Mainly how many
types of blockchains
have emerged after
bitcoin introduced
blockchain to the
world?
A 1 B 2

C 3 D 4

Answer is : C
93 20 MSI M 4 4 A OBJ
22 T 5 Bankchain is an
example
of__________

Priv
A ate B Public

Both
None
a
C and D of the
above
b

Answer is : A
94 20 MSI M 4 4 A OBJ
22 T 5 Digital assets must
always be tangible

A1 B

It
None of
dep
C end D the
above
s

Answer is : B
95 20 MSI M 4 4 A OBJ
22 T 5 Bitcoin network
would make it
impossible to bypass
the traditional
financial
intermediaries

A 1 B

It None
C depe D of the
nds above

Answer is : B
96 20 MSI M 4 4 A OBJ
22 T 5 Consortium
Blockchain provides
a faster and more
protected ecosystem
than a Private
Blockchain?

A 1 B

It None
C depe D of the
nds above

Answer is : A
97 20 MSI M 4 4 A OBJ
22 T 5 Private Blockchain
is a de-centralized
type of Blockchain?

A 1 B

It None
C depe D of the
nds above

Answer is : B
98 20 MSI M 4 4 A OBJ
22 T 5 BlockChain
provides _________
_ a database of every
transaction involving
value

Open Close
decen Decen
A traliz B tralize
ed d

Open Close
C centra D centra
lized lized

Answer is : A
99 20 MSI M 4 4 A OBJ
22 T 5 The value of coins
( litecoin, bitcoin) is
the same at a
particular time
A 1 B

It None
C depe D of the
nds above

Answer is : B
10 20 MSI M 4 4 A OBJ
0 22 T 5 The two types of
cryptography
are_________ .

D
i
A Logic B g
it

Asymmet V
ric and al
C Symmetri Du
c e

Answer is : C
10 20 MSI M 4 4 A OBJ
1 22 T 5 Name the first
cryptocurrency with
computing power
contribution?

Gridc Coi
A B
oin n

Bitc
C Map D
oin

Answer is : A
10 20 MSI M 4 4 A OBJ
2 22 T 5 Encrypted text is
also known as

Plain Ciphe
A Text B r Text

Publi Privat
C c key D e Key

Answer is : B
10 20 MSI M 4 4 A OBJ
3 22 T 5 Which among the
following is the most
flexible
cryptocurrency?

Eth Ledg
A B
er er

Wal
C D Hash
let

Answer is : A
10 20 MSI M 4 4 A OBJ
4 22 T 5 The output of
Hashing is popularly
known as

Conn Digi
A B
ect t

Dige Nu
C D
st mer

Answer is : C
10 20 MSI M 4 4 A OBJ
5 22 T 5 Bitcoins can be
purchased in
exchange for
services

A 1 B

It None
C dep D of the
ends above

Answer is : A
10 20 MSI M 4 4 A OBJ
6 22 T 5 The sender and the
receiver in a
transaction provide
miners with a fee

A 1 B

C It D None
depe of the
nds above

Answer is : B
10 20 MSI M 4 4 A OBJ
7 22 T 5 Which platform
could gain its best
use case from the
financial service
industry?

R3 R4
A Cord B Cord
a a

R5 R6
C Cord D Cord
a a

Answer is : A
10 20 MSI M 4 4 A OBJ
8 22 T 5 Ether provides
greater flexibility
than Bitcoin does

A 1 B

It None
C dep D of the
ends above

Answer is : A
10 20 MSI M 4 4 A OBJ
9 22 T 5 The first smart
contract platform is

Bitc
Ethere
oin
um
A bloc B blockc
kchai
hain
n

Both
Hyb Bitcoi
rid n&
C bloc D Ethere
kchai um
n blockc
hain
Answer is : B
11 20 MSI M 4 4 A OBJ
0 22 T 5 Which of the
following
platform(s) provides
a modular
architecture?

Flop
Hyper
A B py
ledger
Disk

Ban
k
C Wallet D
acco
unt

Answer is : A
11 20 MSI M 4 4 A OBJ
1 22 T 5 New bitcoins are
released every time a
transaction is
verified

A 1 B

It None
C depe D of the
nds above

Answer is : A
11 20 MSI M 4 4 A OBJ
2 22 T 5 Both ________ and
________
automatically check
your previous
transactions to make
sure you have
enough bitcoins to
send

Led Bitcoi
ger n
and Netwo
A your B rk and
Wall your
et Wallet
Min
ers
C and D Digit
User
s

Answer is : A
11 20 MSI M 4 4 A OBJ
3 22 T 5 _______ is
popularty known as
DLT with
difference.

Ethe
Hyper
A B reu
ledger
m

R3 Eth
C D
corda er

Answer is : B
11 20 MSI M 4 4 A OBJ
4 22 T 5 Name of the first
cryptocurrency with
computing power
contribution?

Grid Litec
A B
coin oin

Rippl Bitc
C D
e oin

Answer is : A
11 20 MSI M 4 4 A OBJ
5 22 T 5 Which among the
following are the
advantages of using
Bitcoin?

A Negli B Can
gible be
trans used
actio to
n fee transf
er
mone
y
anywh
ere in
the
world

Your
accou
All
nt
the
C cann D option
ot be
s
froze
n

Answer is : D
11 20 MSI M 4 4 A OBJ
6 22 T 5 Bitcoin is
____________.

Peer
Public
to
to
publi
Ac B peer
curren
curre
cy
ncy

Peer Public
to to
C peer D public
curre curren
ncy cy

Answer is : C
11 20 MSI M 4 4 A OBJ
7 22 T 5 Currencies other
than Bitcoin such as
Litecoin and Dash
are popularly known
as _________.

Cryp
Altcurr
A tocoi B ency
ns

Crypto
Altc
C oins D curren
cy

Answer is : C
11 20 MSI M 4 4 A OBJ
8 22 T 5 In asymmetric key
cryptography, the
private key is kept
by __________.

Every send
one in er
A the B and
netwo recei
rk ver

receiv send
C er D er

Answer is : C
11 20 MSI M 4 4 A OBJ
9 22 T 5 HASH can be used
to validate the input.

Sometime
A 1 B
s yes

C D None

Answer is : A
12 20 MSI M 4 4 A OBJ
0 22 T 5 Crypto analysis is
used ___________.

To find To
some incr
insecurit eas
A y in a B e
cryptogr the
aphic spe
scheme ed

non
to e of
C encrypt D the
the data opti
ons

Answer is : C
12 20 MSI M 5 5 A OBJ
1 22 T 5 In which of the
following, a person
is constantly
followed/chased by
another person or
group of several
peoples?

Phis Bulli
A B
hing ng

Ident
Stalk
C D ity
ing
theft

Answer is : C
12 20 MSI M 5 5 A OBJ
2 22 T 5 Which one of the
following can be
considered as the
class of computer
threats?

Dos
Phish
A Attac B
ing
k

Both
Solic A
C D
iting and
C

Answer is : A
12 20 MSI M 5 5 A OBJ
3 22 T 5 Which of the
following is
considered as the
unsolicited
commercial email?

Vi Malwar
A B
rus e

All of
Sp
C D the
am
above

Answer is : C
12 20 MSI M 5 5 A OBJ
4 22 T 5 Which of the
following usually
observe each activity
on the internet of the
victim, gather all
information in the
background, and
send it to someone
else?

Mal Spyw
A B
ware are

All of
Adw
C D the
are
above

Answer is : B
12 20 MSI M 5 5 A OBJ
5 22 T 5 _______ is a type of
software designed to
help the users
computer detect
viruses and avoid
them.

Mal Adw
A B
ware are

Both
Anti B
C D
virus and
C

Answer is : C
12 20 MSI M 5 5 A OBJ
6 22 T 5 Which one of the
following is a type
of antivirus
program?

Quic
Mcaf
A k B
ee
heal

All of
Kasp
C D the
ersky
above

Answer is : D
12 20 MSI M 5 5 A OBJ
7 22 T 5 It can be a software
program or a
hardware device that
filters all data
packets coming
through the internet,
a network, etc. it is
known as
the_______:

Antiv Fire
A B
irus wall

Cook Mal
C D
ies ware

Answer is : B
12 20 MSI M 5 5 A OBJ
8 22 T 5 Which of the
following refers to
exploring the
appropriate, ethical
behaviors related to
the online
environment and
digital media
platform?

Cybe
Cyber
A low B rethi
cs

Cyber Cybe
C securit D rsafet
y y

Answer is : B
12 20 MSI M 5 5 A OBJ
9 22 T 5 Which of the
following refers to
the violation of the
principle if a
computer is no more
accessible?

A Acce B Confid
ss entialit
contr y
ol

Avai All of
C labili D the
ty above

Answer is : C
13 20 MSI M 5 5 A OBJ
0 22 T 5 Which one of the
following refers to
the technique used
for verifying the
integrity of the
message?

Digit Decry
al ption
A B
sign algorit
ature hm

Messa
Prot
C ocol D ge
Digest

Answer is : D
13 20 MSI M 5 5 A OBJ
1 22 T 5 Which one of the
following usually
used in the process
of Wi-Fi-hacking?

Aircr
Wires
A ack- B hark
ng

All of
Nort
C on D the
above

Answer is : A
13 20 MSI M 5 5 A OBJ
2 22 T 5 Which of the
following port and
IP address scanner
famous among the
users?

A Cain B Angry
and IP
Abe Scann
l er

Snor Etterc
C D
t ap

Answer is : B
13 20 MSI M 5 5 A OBJ
3 22 T 5 In ethical hacking
and cyber security,
there are _______
types of scanning:

A 1 B 2

C 3 D 4

Answer is : C
13 20 MSI M 5 5 A OBJ
4 22 T 5 Which of the
following is not a
type of scanning?

Xmas Clou
A Tree B d
Scan scan

SYN
Null
C Scan D Steal
th

Answer is : B
13 20 MSI M 5 5 A OBJ
5 22 T 5 In system hacking,
which of the
following is the most
crucial activity?

Inform Cove
ation ring
A gatheri B track
ng s

C Cracki D Non
ng e of
passw the
abov
ords
e

Answer is : C
13 20 MSI M 5 5 A OBJ
6 22 T 5 Which of the
following are the
types of scanning?

Networ Port
k, ,
vulnera net
bility, wor
A and B k,
port and
scannin serv
g ices

Client, Non
Server, e of
C and D the
networ abo
k ve

Answer is : A
13 20 MSI M 5 5 A OBJ
7 22 T 5 Which one of the
following is actually
considered as the
first computer virus?

Sass Blast
A B
er er

Both
Cree
C D A and
per
C

Answer is : C
13 20 MSI M 5 5 A OBJ
8 22 T 5 To protect the
computer system
against the hacker
and different kind of
viruses, one must
always keep
_________ on in the
computer system.
Antiv Fire
A B
irus wall

Vlc
Scri
C playe D
pt
r

Answer is : B
13 20 MSI M 5 5 A OBJ
9 22 T 5 Code Red is a type
of ________

A
An
photo
Antiv
editin
A irus B g
Progr
softw
am
are

A
A video
comp editin
C uter Dg
virus softw
are

Answer is : C
14 20 MSI M 5 5 A OBJ
0 22 T 5 Which of the
following can be
considered as the
elements of cyber
security?

Appli Opera
cation tional
A Secur B Secur
ity ity

Netw
All of
ork
C Secur D the
above
ity

Answer is : D
14 20 MSI M 5 5 A OBJ
1 22 T 5 Which one of the
following is also
referred to as
malicious software?

Bad
Malicio
A usware B war
e

Mal
Ilegalw
C are D war
e

Answer is : D
14 20 MSI M 5 5 A OBJ
2 22 T 5 In Wi-Fi Security,
which of the
following protocol is
more used?

W
A B WPA2
PA

Both
W
C D A and
PS
C

Answer is : B
14 20 MSI M 5 5 A OBJ
3 22 T 5 The response time
and transit time is
used to measure the
____________ of a
network.

Secu Longe
A rity B vity

Relia Perfor
C bility D mance

Answer is : D
14 20 MSI M 5 5 A OBJ
4 22 T 5 Which of the
following factor of
the network gets
hugely impacted
when the number of
users exceeds the
networks limit?
Relia Perfor
A bility B mance

Secu Longe
C rity D vity

Answer is : D
14 20 MSI M 5 5 A OBJ
5 22 T 5 In the computer
networks, the
encryption
techniques are
primarily used for
improving the
________

Securi Relia
A B
ty bility

Perfor Long
C mance D evity

Answer is : A
14 20 MSI M 5 5 A OBJ
6 22 T 5 When was the first
computer virus
created?

197 197
A B
0 1

197 196
C D
2 9

Answer is : B
14 20 MSI M 5 5 A OBJ
7 22 T 5 Which of the
following is
considered as the
worlds first antivirus
program?

Cree Reape
A B
per r

C Tink D Ray
ered Tomli
nson

Answer is : B
14 20 MSI M 5 5 A OBJ
8 22 T 5 Which one of the
following principles
of cyber security
refers that the
security mechanism
must be as small and
simple as possible?

Econo
Ope
my of
n-
A Desi B the
Mecha
gn
nism

Leas Fail-
t safe
C privi D Defaul
lege ts

Answer is : B
14 20 MSI M 5 5 A OBJ
9 22 T 5 Which of the
following principle
of cyber security
restricts how
privileges are
initiated whenever
any object or subject
is created?

Open
Least
-
A privil B
Desi
ege
gn

None
Fail-
of
safe
C D the
Defau
abov
lts
e

Answer is : C
15 20 MSI M 5 5 A OBJ
0 22 T 5 Which of the
following can also
consider as the
instances of Open
Design?

CS DVD
A B
S Player

Both
Onl
C D A and
yA
B

Answer is : D

You might also like