You are currently viewing Blockchain and its Applications Assignment 11 Answers 2023
Blockchain and its Applications Assignment 11 Answers

Blockchain and its Applications Assignment 11 Answers 2023

Table of Contents
Blockchain and its Applications Assignment 1 Answers
Blockchain and its Applications Assignment 2 Answers
Blockchain and its Applications Assignment 3 Answers
Blockchain and its Applications Assignment 4 Answers
Blockchain and its Applications Assignment 5 Answers
Blockchain and its Applications Assignment 6 Answers
Blockchain and its Applications Assignment 7 Answers
Blockchain and its Applications Assignment 8 Answers
Blockchain and its Applications Assignment 9 Answers
Blockchain and its Applications Assignment 10 Answers
Blockchain and its Applications Assignment 11 Answers

Blockchain and its Applications Assignment 11 Answers

1) Hyperledger Aries is used for transmitting verifiable digital credentials.

a. False

b. True

Answer: b

2) Which of the following is true about Hyperledger Aries?

a. Aries cloud agent exposes API to access Aries capabilities

b. Aries controller implements application business logic

c. The controller sends requests

d. Response events are fed back to the controller as webhooks

Answer: a, b, c, d

3) Which of the following is not a risk for blockchain operations?

a. 51% vulnerability

b. Private key security

c. Double spending

d. None of the above

Answer: d

4) Selfish mining attacks cause forking problems in the network.

a. True

b. False

Answer: a

5) Which of the following is/are true for Eclipse Attack.

a. The Attacker partitions miners

b. The attacker re-populates the victim mode’s peer tables

c. The victim node restarts and loses current outgoing connections

d. The victim establishes all new outgoing connections to attacker IP addresses

Answer: a, b, c, d

6) Attacker can perform a front-running attack if he/she knows about upcoming transactions?

a. False

b. True

Answer: b

7) Blockchain Trust is mainly controlled by which of the following?

a. Consensus

b. Immutability

c. Provenance

d. Finality

Answer: a, b, c, d

8) For defining enterprise-level blockchain, which of the below factors need to be analyzed?

a. Network

b. People

c. Assets

d. Transactions

Answer: a, b, c, d

9) In which of the following cases a node stops responding?

a. Power failure

b. Network failure

c. Security updates

d. DoS attacks

Answer: a, b, c, d

10) What is a major problem with Proof of Work in a large-scale network?

a. It is difficult to implement

b. It is Resource-intensive and consumes enormous amounts of power

c. Multiple miners have to be rewarded

d. It is unreliable

Answer: b

Disclaimer: CHANDRAS EDU does not guarantee the correctness of the answers. These answers are based on the data provided by the NPTEL video lectures, are just for reference, and request students to complete the assignments independently.

If you have any suggestions, comment below or contact us at admin@chandrashaker.com

If you found this article interesting and helpful, don’t forget to share it with your friends.