Blockchain Basics Week 3 Quiz Answer
Week 3
Algorithms & Techniques
Week 3 ---- Quiz 1 Answers
Question 1)
A popular public-private key implementation known as Rivest-Shamir Adelman (RSA) algorithm is used for the Bitcoin and Ethereum Blockchain. True or False?
- True
- False
Question 2)
For the simple symmetric key example discussed in the lecture, it is easy to derive the “secret” key from the encrypted data. True or False?
- True
- False
Question 3)
256 bit ECC key-pair is equivalent in strength to approximately 3072-bit RSA key-pair. Thus ECC is much stronger encryption than RSA method. True or False?
- True
- False
Week 3 ---- Quiz 2 Answers
Question 1)
What is one of the requirements of secure hashing function?
- It is log function
- It is an ECC function
- It is a one way function
- It is a secret function
Question 2)
What type of hash is used when there is a fixed number of items to be hashed, such as the items in a block header, and we are verifying the composite block integrity?
- Either
- Complex hash
- Simple Hash
- Tree-structured Hash
Question 3)
What type of hash function is used, when there is variable number of items to be hashed, such as the many state changes in a block?
- Simple Hash
- Either
- Complex hash
- Tree-structured Hash
Question 4)
Keccak 256 is a commonly used algorithm for hash generation in the Ethereum blockchain. True or False?
- True
- False
Week 3 ---- Quiz 3 Answers
Question 1)
Digital signing of a transaction/document involves, hashing the content of the document and then __.
- rehashing it
- encrypting it with nonce
- encrypting it with public key
- encrypting it with private key
Question 2)
In Ethereum, the block hash is the hash of all the elements in the?
- State tree
- Receipt tree
- Block header
- Transaction hash tree
Question 3)
Merkle tree hash is used for computing hash.
- state root
- receipt root
- transaction root
- all of the above
Question 4)
Block hash allows for the formation of the chain link by embedding the previous block hash in the current block header. True or False?
- True
- False
Question 5)
If a participant node tampers with a block, it results in __.
- mismatch of hash values
- the local chain of node rendered in an invalid state
- hash changing
- All of the above
0 Comments