Question 6 of 229

A ____________cipher basically means it is using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.

What is the cipher type?

Answer

Suggested Answer

The suggested answer is A.

Stream cipher basically means using a fixed key which replaces the message with a pseudorandom string of characters. It is basically the encryption of each letter one at a time.
Reference:
https://blockgeeks.com/guides/cryptocurrencies-cryptography/
Question 7 of 229

You currently using the Metamask Chrome plugin and you see a selection for Etherescan in the plugin.

What is Etherscan used for?

Answer

Suggested Answer

The suggested answer is A.

A search engine that allows users to easily lookup, confirm and validate transactions that have taken place on the Ethereum Blockchain
Reference:
https://etherscancom.freshdesk.com/support/solutions/articles/35000022140-what-is-etherscan-
Question 8 of 229

What are two challenges with using a Proof of Work algorithm? (Select two.)

Answer

Suggested Answer

The suggested answer is C, D.

Reference:
http://www.hl.co.uk/news/2018/2/16/a-brief-history-of-blockchain-technology-everyone-should-read
Question 9 of 229

Your customer is an enterprise that is focused on financial sectors.

What type of blockchain would this customer likely want specified for their enterprise?

Answer

Suggested Answer

The suggested answer is D.

Sometimes referred to as "private" blockchains, you are required to have some sort of permission to access any or parts of that blockchain. There are a multitude of variants and hybrid permissioned/permissionless blockchains that exist.
Reference:
https://medium.com/@dustindreifuerst/permissioned-vs-permissionless-blockchains-acb8661ee095
Question 10 of 229

Which is the following is the metaphor that describes a logical dilemma that plagues many computer networks?

Answer

Suggested Answer

The suggested answer is B.

The correct metaphor that describes a logical dilemma affecting computer networks is the Byzantine Generals' problem. This problem involves coordinating among multiple generals, or nodes, to agree on a unified strategy in the presence of some traitorous generals who may act maliciously or fail, causing communication issues. The problem highlights the challenges of reaching a consensus in distributed computing systems, particularly in the presence of faults or malicious actors.