week-2 mcqs
week-2 mcqs
related to cryptography, blockchain, and distributed systems, along with their answers and detailed
solutions:
d) Guaranteeing non-repudiation
Answer: (b)
Detailed solution: Confidentiality ensures that sensitive information is not disclosed to unauthorized
individuals or entities.
a) Encryption algorithms
b) Digital signatures
c) Hash functions
Answer: (c)
Detailed solution: Hash functions produce a fixed-size digest of a message. Any alteration to the
message will result in a different hash, thus revealing tampering.
Answer: (b)
Detailed solution: A digital signature uses the sender's private key to sign a message, allowing the
recipient to verify the sender's identity using the corresponding public key and confirm that the
message hasn't been altered.
c) It is computationally infeasible to find a collision (two different inputs producing the same hash).
d) The output size is always smaller than the input size, and the reduction is significant.
Answer: (c)
Detailed solution: Collision resistance is a crucial property of secure hash functions, making it
extremely difficult to find two different messages that produce the same hash value.
Answer: (d)
Detailed solution: To ensure only the intended recipient can read the message, Alice encrypts it using
Bob's public key, which only Bob's private key can decrypt.
b) To decrypt messages encrypted with the corresponding public key and to create digital signatures.
Answer: (b)
Detailed solution: The private key is kept secret and is used for decryption and signing, operations
that only the key holder should be able to perform.
b) An attack where an unauthorized party intercepts and potentially alters communication between
two parties.
Answer: (b)
Detailed solution: In a man-in-the-middle attack, the attacker secretly relays and possibly alters the
communications between two parties who believe they are directly communicating with each1
other.
Answer: (b)
Detailed solution: Instead of storing passwords in plaintext, systems often store their hash values.
This way, even if the database is compromised, the actual passwords are not directly revealed.
c) It is the product of the two large prime numbers used for key generation.
Answer: (c)
Detailed solution: The modulus 'n' in RSA is calculated as the product of two large prime numbers (p
and q), and it is part of both the public and private keys.
10. What is the Euler's totient function, φ(n), used for in RSA?
Answer: (c)
Detailed solution: The Euler's totient function, φ(n) = (p-1)(q-1), is crucial for finding the modular
inverse of the encryption exponent (e), which gives the decryption exponent (d).
Blockchain Technology
d) A type of cryptocurrency.
Answer: (b)
Detailed solution: A blockchain is characterized by its distributed nature, where data is replicated
across many nodes, and its immutability, where once a block is added, it cannot be easily altered.
Answer: (b)
Detailed solution: Blocks are the fundamental building units of a blockchain, bundling multiple
verified transactions together.
Answer: (b)
Detailed solution: Miners in a PoW system iteratively try different nonce values until they find one
that, when combined with the block's data and hashed, produces a hash that starts with a certain
number of leading zeros (determined by the difficulty).
Answer: (b)
Detailed solution: A Merkle Tree is a tree-like structure where each leaf node is the hash of a
transaction, and each non-leaf node is the hash of its children. The root hash (Merkle root) provides
a cryptographic summary of all transactions in the block, allowing for efficient verification of
transaction inclusion.
15. What does the "51% attack" refer to in the context of blockchain?
b) An attack that floods the network with a large number of invalid transactions.
d) An attack that tries to disrupt the network by taking down a significant number of nodes.
Answer: (a)
Detailed solution: A 51% attack occurs when a single entity or group controls more than half of the
network's mining power or staked tokens, potentially allowing them to manipulate the blockchain
and double-spend their cryptocurrency.
b) Self-executing code with the terms of an agreement directly written into it.
Answer: (b)
Detailed solution: Smart contracts are programs stored on the blockchain that automatically execute
predefined actions when specific conditions are met, without the need for intermediaries.
Answer: (b)
Detailed solution: A block explorer is a web-based tool that allows users to publicly view and search
the history of transactions and other data on a blockchain.
18. What is the difference between a public blockchain and a private blockchain?
d) Public blockchains are controlled by a single organization, while private blockchains are
decentralized.
Answer: (b)
Detailed solution: In a public blockchain, anyone can participate in the network (read, write, and
audit). In a private blockchain, access and participation are restricted to authorized entities.
b) A radical change to the blockchain's protocol that creates a new, separate blockchain.
Detailed solution: A hard fork is a significant protocol upgrade that is not backward-compatible.
Nodes running the old software will not be able to validate transactions on the new chain, leading to
a split in the blockchain.
a) A radical change to the blockchain's protocol that creates a new, separate blockchain.
Answer: (c)
Detailed solution: A soft fork is a change to the blockchain's protocol that is backward-compatible.
Nodes that have not upgraded can still validate transactions on the new version of the blockchain.
Consensus Mechanisms
Answer: (b)
Detailed solution: Consensus mechanisms ensure that all participants in a decentralized network
agree on which transactions are valid and the order in which they are added to the blockchain.
22. In Proof of Stake (PoS), how are validators typically chosen to create new blocks?
Answer: (b)
Detailed solution: In PoS, validators are selected to propose and validate new blocks based on the
amount of cryptocurrency they have locked up as stake.
b) The penalty for validators who act maliciously or fail to properly validate transactions, resulting in
the loss of a portion of their staked cryptocurrency.
c) A technique used to increase the transaction throughput of a blockchain.
Answer: (b)
Detailed solution: Slashing is a security mechanism in PoS that discourages dishonest behavior by
penalizing validators who violate the network's rules.
24. Which of the following is a key advantage of Proof of Stake (PoS) over Proof of Work (PoW)?
Answer: (b)
Detailed solution: PoS is generally much more energy-efficient than PoW because it doesn't require
massive computational power for mining.
25. What is a "Byzantine Fault" in the context of distributed systems and consensus?
b) A condition where a component in a distributed system can fail in arbitrary ways, including
producing incorrect or conflicting information to different nodes.
Answer: (b)
Detailed solution: Byzantine Faults are the most difficult type of failure to handle in distributed
systems because faulty nodes can behave unpredictably.
26. Which consensus mechanism is known for its high transaction throughput and low latency,
often used in permissioned blockchains?
Answer: (c)
Detailed solution: PBFT is a consensus algorithm designed to tolerate Byzantine faults and is often
used in environments where participants are known and trusted to some extent, allowing for higher
performance.
27. In Delegated Proof of Stake (DPoS), how are block producers (validators) selected?
a) Directly proportional to the amount of cryptocurrency they stake.
Answer: (c)
Detailed solution: DPoS relies on a system where token holders vote for a set of delegates who are
then responsible for validating transactions and creating new blocks.
28. What is the "nothing-at-stake" problem associated with some Proof of Stake (PoS) systems?
a) The risk of validators losing all their staked cryptocurrency due to network failures.
b) The potential for validators to vote on multiple conflicting versions of the blockchain without any
significant economic risk.
d) The increased computational resources required to run a PoS node compared to a PoW node.
Answer: (b)
Detailed solution: The nothing-at-stake problem arises because, in some naive PoS designs, validators
might have no incentive to vote honestly on only one chain, as they could potentially gain rewards on
multiple forks without losing their stake on any of them.
Answer: (b)
Detailed solution: Bitcoin was the first widely adopted cryptocurrency and utilizes the Proof of Work
consensus mechanism.
b) A measure of how hard it is to find a new block hash that meets the target.
Answer: (b)
Detailed solution: The difficulty adjusts periodically to maintain a consistent block creation rate. It
determines the number of leading zeros required in the hash of a new block.
Distributed Systems & Blockchain Principles
Answer: (b)
Detailed solution: A distributed ledger is a database that is spread across multiple sites, regions, or
participants in a network, ensuring transparency and redundancy.
b) The property that once a transaction is recorded on the blockchain, it is extremely difficult to alter
or delete.
Answer: (b)
Detailed solution: Immutability is achieved through cryptographic hashing and the chaining of blocks.
Each block contains the hash of the previous block, making it computationally infeasible to change
past records without invalidating all subsequent blocks.
Answer: (b)
Detailed solution: Decentralization aims to eliminate single points of failure and censorship by
distributing power and data across a network.
Q1. In RSA, if e=7e = 7e=7, p=5p = 5p=5, and q=17q = 17q=17, what is the value of ddd?
a) 23 b) 47 c) 103 d) 143
Answer: a) 23
φ(n) = (5−1)(17−1) = 4×16 = 64. Find d such that ed≡1mod 64ed ≡ 1 \mod 64ed≡1mod64 → d=23d =
23d=23
Q2. Which of the following ensures integrity in a secure communication?
a) Encryption b) Hashing c) Key Exchange d) Public Key
Answer: b) Hashing
Q6. What is verified using the sender’s public key in digital signatures?
a) Encryption
b) Signature
c) Message
d) Key exchange
Answer: b) Signature
Merkle Trees
Bitcoin Specific
Cryptocurrency Principles
Advanced Concepts