Blockchain Basics Week 3 Quiz Answer

Blockchain Basics Week 3 Quiz Answer

Blockchain Basics Week 3 Quiz Answer


Week 3
Algorithms & Techniques



Week 3 ---- Quiz 1 Answers


Question 1)

A popular public-private key implementation known as Rivest-Shamir Adelman (RSA) algorithm is used for the Bitcoin and Ethereum Blockchain. True or False?

  • True
  • False



Question 2)

For the simple symmetric key example discussed in the lecture, it is easy to derive the “secret” key from the encrypted data. True or False?

  • True
  • False



Question 3)

256 bit ECC key-pair is equivalent in strength to approximately 3072-bit RSA key-pair. Thus ECC is much stronger encryption than RSA method. True or False?

  • True
  • False



Week 3 ---- Quiz 2 Answers

Question 1)

What is one of the requirements of secure hashing function?

  • It is log function
  • It is an ECC function
  • It is a one way function
  • It is a secret function



Question 2)

What type of hash is used when there is a fixed number of items to be hashed, such as the items in a block header, and we are verifying the composite block integrity?

  • Either
  • Complex hash
  • Simple Hash
  • Tree-structured Hash



Question 3)

What type of hash function is used, when there is variable number of items to be hashed, such as the many state changes in a block?

  • Simple Hash
  • Either
  • Complex hash
  • Tree-structured Hash



Question 4)

Keccak 256 is a commonly used algorithm for hash generation in the Ethereum blockchain. True or False?

  • True
  • False



Week 3 ---- Quiz 3 Answers

Question 1)

Digital signing of a transaction/document involves, hashing the content of the document and then __.

  • rehashing it
  • encrypting it with nonce
  • encrypting it with public key
  • encrypting it with private key


Question 2)

In Ethereum, the block hash is the hash of all the elements in the?

  • State tree
  • Receipt tree
  • Block header
  • Transaction hash tree



Question 3)

Merkle tree hash is used for computing hash.

  • state root
  • receipt root
  • transaction root
  • all of the above



Question 4)

Block hash allows for the formation of the chain link by embedding the previous block hash in the current block header. True or False?

  • True
  • False



Question 5)

If a participant node tampers with a block, it results in __.

  • mismatch of hash values
  • the local chain of node rendered in an invalid state
  • hash changing
  • All of the above







Blockchain Basics Week Coursera Answer



Post a Comment

0 Comments