Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
517 views30 pages

Block - Chain Solution

The document contains 10 multiple choice questions related to blockchain concepts like consensus algorithms, digital signatures, hash pointers, Merkle trees, and Bitcoin mining. The questions assess understanding of properties like decentralization, cooperation, immutability, and security features of cryptographic hash functions and how they are applied in blockchain technologies.

Uploaded by

Pk Bijoy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
517 views30 pages

Block - Chain Solution

The document contains 10 multiple choice questions related to blockchain concepts like consensus algorithms, digital signatures, hash pointers, Merkle trees, and Bitcoin mining. The questions assess understanding of properties like decentralization, cooperation, immutability, and security features of cryptographic hash functions and how they are applied in blockchain technologies.

Uploaded by

Pk Bijoy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

NOC22-CS44: Blockchain and Its Applications

Assignment 1

Correct choices are highlighted in Yellow . Give partial marks for partially correct answers.

1. Which one is true for an ideal decentralized solution for business management?
a. A centralized authority should decide the overall trust
b. Everyone should trust and cooperate with each other
c. No one should trust and cooperate with each other
d. No one should trust each other, however they should
cooperate

Hint: In a real-time scenario a decentralized system has multiple stakeholders and the
information submitted by them is not guaranteed to be correct. A collective agreement has to be
established.

2. Which of the statements below is/are true for successful run of decentralized
distributed systems?
a. Network of different players
b. Players must trust each other
c. If they cooperate, the society gets benefitted
d. None of the above

Hint: In a decentralized distributed system, a group of parties who may or may not know or
trust each other. But they should cooperate to reach a collective decision to benefit the system
as whole. So in a decentralized system trusting everyone is not always necessary to reach a
decision..

3. Where are the transactions logs recorded in a blockchain?


a. Centralized editable database
b. Editable log file
c. On centralized immutable database
d. On append only distributed immutable ledger
Hint: Refer to the slide of week1. An immutable append only ever growing chain of data is
used for blockchain. Data once added cannot be deleted or modified later.

4. What are the properties of cryptographic hash function?


a. It should be deterministic
b. It should be collision free
c. Ability to hide the input message
d. Puzzle friendly
Hint: Refer to the Week 1 slide. All the above properties are desirable for secure hashing.

5. For a 512 bit hash function, the attacker needs to compute how many hash
operations in order to find two matching outputs in the initial round?
a. 2512
b. 2128
c. 2256
d. 260

Hint: If a hash function produces N bits of output, an attacker needs to compute only 2N/2 hash
operations on a random input to find two matching outputs initially. The attacker can use the
output combination again to use in subsequent rounds.
6. Which of the following is a correct statement about a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts the hash value
d. one can easily find two different messages with same hash

Hint: Refer to the Week 1 slide for the properties of cryptographic hash functions.

7. What are the security features of a hash function?


a. Non-deterministic
b. Puzzle-friendly
c. Collision-resistance
d. Preimage resistance

Hint: Refer to the Week 1 slide for the properties of cryptographic hash functions.

8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block.
This above statement is True or False.
a. True
b. False

Hint: SHA-256 is used in Bitcoin mining to construct the Bitcoin blockchain

9. For hash computation in SHA-512, what is the size of the block that the
message is divided into?
a. 1024
b. 512
c. 256
d. 1248

Hint: The message is divided into blocks of size 1024 bits, and the output produced is a 512-bit
message digest.

10. What is the message for hash value of


“8abe09bf65aefdb8e84bd8564efb765179cc01ee3f45809e47c8c9a02f72ff83” if SHA-256
is used? (case sensitive)
a. Consensus
b. Swayam
c. SWAYAM
d. Consensus

Hint: Verify the result https://emn178.github.io/online-tools/sha256.html


NOC22-CS44: Blockchain and Its Applications
Assignment 2

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Let Bob wants to send a long message to Alice. Alice should be able to confirm that it
was indeed sent by Bob, and Bob later cannot deny that he had sent the message.
They also want that nobody else should be able to see its content. Alice and Bob
plan to use public key cryptography and cryptographic hashing techniques. Let the
key pairs of Alice and Bob be (Pub A, Pri A) and (Pub B, Pri B), respectively. Let E, D
and H be the encryption, decryption and hash functions, respectively. Let M denote
the Message and H(M) its digest. Which of the following describes the correct order
of steps to be used by Alice to send the digitally signed message.
i. At Bob: M’ = E(M, K pubA)
ii. At Alice: M = E(M’, K priA)
iii. Bob sends the message M’ to Alice
iv. The signature along with the message is sent to Alice (M, M’)
v. Bob: M’ = E(M, K priB)
vi. Signing the message with his private key: S = E(H(M), KpriB)
vii. M = E(M’, KpubB)

a. i, iii, ii, v, iv, vii, vi


b. i, ii, iii, iv, v, vi, vii
c. v, vii, ii, i, iii, iv, vi
d. vii, vi, v, iv, iii, ii, i

2. Digitally signing transactions by sender in Blockchain does not ensure to solve


repudiation/ verifiability problems. Is the above statement True or False?
a. True
b. False

3. Which of the following is used to point a block in blockchain:


a. Hash Pointer
b. User ID
c. Transaction ID
d. Timestamp

Hint: Refer to the Week 1 Slide for Hash Pointer

4. Suppose you have 6 data points -- 1 to 6. The post-order traversal of the Merkle Tree
is given by (here 8 means hash of 8, 43 means the combined hash of 4 and 3, and
so on):
a. {12345656, 1234, 5656, 12, 34, 56, 56, 1, 2, 3, 4, 5, 6}
b. {1, 12, 2, 3, 4, 34, 1234, 5, 6, 56, 123456}
c. {1, 2, 12, 3, 4, 34, 1234, 5, 6, 56, 78, 5678, 12345678}
d. {1, 2, 12, 3, 4, 34, 1234, 5, 6, 56, 56, 5656, 12345656}
Hint:

Post order Traversal : {1, 2, 12, 3, 4, 34, 1234, 5, 6, 56, 56, 5656, 12345656}

5. Which of the following is true for using a digital signature in blockchain?


a. To check the validity of the source of a transactions
b. None of the above.
c. It will ensures that no one can deny of their own transaction
d. It supports user authentication
Hint: Refer to Week 2 Slide for Digital Signature.

6. Which are the main Consensus Algorithms?


a. Proof of Work
b. Proof of Wager
c. Proof of Stake
d. Proof of Mining
Hint: PoW and Pos are the main consensus algorithms

7. Why is consensus hard in asynchronous system?

I. No notion of global time

II. faults in network

III. nodes may crash/ faulty nodes

a. II, III

b. I, II

c. I, III

d. I, II, II

Hint: Due to lack of global timing reference,various kinds of faults it is very difficult to come to
agreement between nodes unanimously.

8. Liveliness property ensures the output should be produced within a finite time limit?
a. False
b. True
Hint: Refer to Week 2 Slide, liveliness property talks about eventual termination.

9. Paxos consensus support(s) which of the below properties


a. Liveliness
b. Safety
c. Both
d. None of the above

Hint: Refer to Week 2 Slide, Paxos supports safety but not liveliness.

10. Which is/are true for Raft consensus?


a. Crash Fault Tolerant
b. Byzantine Fault Tolerant
c. Both
d. None of the above
Hint: Raft does not support byzantine fault tolerance in basic form.
NOC22-CS44: Blockchain and Its Applications
Assignment 3

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Bitcoin mining is performed by ____.


a. Miner nodes
b. Internal Nodes
c. External Nodes
d. Orphan Nodes

Hint: Bitcoin mining is proposed by Miner nodes.

2. DLT can be used to maintain financial information only.


a. False
b. True

Hint: DLT can even be used to store various types of information, codes, etc., apart
from financial data. Please refer to the slide.

3. Which of the following is/are true for basic PoW consensus?


a. Miner needs to propose a block
b. The miner needs to solve a puzzle to obtain target block hash
c. The puzzle solution is added as proof for leadership
d. Successful miner node is rewarded

Hint: All of the above are true for general PoW consensus. Please refer to the slide.

4. Bitcoin Scripting Language:


a. Not Turing Complete
b. Supports Cryptography
c. Stack Based
d. Supports infinite time/memory

Hint: Bitcoin Scripts are simple, compact, stack-based, support cryptography, and not
Turing complete.

5. Permissioned blockchain is regarded as more secure than open blockchain as the


participants are known beforehand and pre-authenticated.
a. True
b. False

Hint: Please refer to the slide. Permissioned blockchain is closed network among
known pre authorized participants and more secure from unknown nodes.

6. What is nonce?
a. The transaction id number
b. A miners ASIC chip array
c. The generator point used in elliptic curve cryptography

d. The number miners run through to generate a correct hash

Hint: Miners propose new blocks by solving the puzzle i.e., finding the nonce
corresponding to a target block hash, and add that solution as proof.
of solving the challenge to be the leader

7. Which one of the following opcodes is needed to remove the top stack item.
a. OP_POP
b. OP_DEQUE
c. OP_DROP
d. OP_DELETE
Hint: Refer https://en.bitcoin.it/wiki/Script to get to know more opcodes.

8. Which of these fields is present in a Bitcoin block summary?


a. Difficulty
b. Gas Used
c. Gas Limit
d. Private Key of the Sender
Hint: The bitcoin block header contains mining statistics timestamp, nonce and
difficulty

9. If the four-byte difficulty bits in hex form are 0x1b0404cb, and the target value is
calculated using X * 2^(Y), what is the values for X and Y respectively,
a. X = 0x0404cb, Y = 0x1b
b. X = 0x0404cb, Y = 0x18
c. X = 0x0404cb, Y = 0xc0
d. X = 0x1b0404, Y = 0xcb
Hint: In difficulty = 0x1b0404cb, the exponent is 1b and coefficient is 0404cb
Target = 0x0404cb * 2^(0x08 * (0x1b - 0x03))
On solving the above equation
⇒ target = 0x0404cb * 2^(0x08 * 0x18)
⇒ target = 0x0404cb * 2^(0xc0)

10. In bitcoin block header, the block identifier is calculated

a. Using SHA256 on the current block header


b. Using Double SHA256 on the previous block hash
c. Using Double SHA256 on the Difficulty bits
d. Using Double SHA256 on the current block header

Hint: Block identifier is calculated by using Double SHA256 algorithm on the current
block header
NOC22-CS44: Blockchain and Its Applications
Assignment 4

Correct choices are highlighted in Yellow . Give partial marks for partially
correct answers.

1. “We can achieve consensus with a single crash failure in a perfect asynchronous
network.” This scenario is ?

a. Always true
b. Impossible
c. Can’t say
d. Sometimes true
Hint: As The Impossibility Theorem states Consensus is not possible in a perfect
asynchronous network even with a single crash failure

2. Which is/are the example/s of a double-spending attack?


a. Anwesha has a total of 60 unspent bitcoins from two different
transactions with an equal amount of bitcoins each. She sends the
entire amount each to Arpita and Ankur from one of the transactions
b. Bobby bought a bike using ‘t’ bitcoins. On delivery, the bitcoins are
transferred from his wallet to the shopper ’s wallet. Simultaneously, he
uses that bitcoins for another purchase
c. Bibhu has 140 unspent bitcoins. He sends the entire amount each to
Deepak and Tanmay
d. Deepak and Bibhu each have 70 unspent bitcoins. Both of them transfer 20
bitcoins to each other

Hint: Double spending is when a person tries to use the same bitcoin for more than
one Transaction knowingly or accidentally.

3. What is the correct order of adding a new block to blockchain


i. Block Mining
ii. Block propagation
iii. Block Flooding
iv. Transaction Flooding
a. iii, iv, ii, i
b. iv, iii, ii, i
c. ii, i, iii, iv
d. iv, i, iii, ii
Hint: Refer to Week 4 Slide

4. Double spending is reusing digital assets intentionally or inadvertently. True or False?


a. True
b. False
Hint: Double spending is when a person tries to use same bitcoin for more than one
Transaction knowingly or accidentally.

5. In the blockchain, cryptography ensures the authenticity of a transaction and also


helps prevent double-spend. Is the above statement True or False?
a. True
b. False
Hint: Cryptography techniques enforce strong integrity of its transaction record and
the validation in the longest chain prevents double spending in blockchain

6. What are Bitcoin exchanges available in India:


i. BuyUCoin
ii. ZebPay
ii. WazirX
a. i and ii
b. ii and iii
c. i and iii
d. i, ii and iii
Hint: Refer to this
post.

7. The primary difference between the permissionless and permissioned blockchain is


?
a. Access control for the participants in the blockchain network
b. Hash Algorithms
c. Confidentiality
d. Availability
Hint: Permissionless blockchain is an open network, e.g. bitcoin, anyone can join,
transact, leave, and rejoin the network whereas permissioned blockchain is a
closed network e.g. Hyperledger. Both networks use the same hash algorithms and
Offer confidentiality and availability.

8. What is an advantage of a permissionless blockchain?


a. It does not use disinterested third parties to secure blocks, as all participants
have a vested interest.
b. It is more resilient against fraud because it uses federated nodes to combat
fraud.
c. It is open to everyone in the world without permission and licensing
requirements.
d. Its networks are built by for-profit companies and the working of the network
is guaranteed.
Hint: Refer to the Week 4 Slide

9. After a hard fork, the emerging two chains are incompatible. True or False?
a. True
b. False
Hint: After adding a new rule to the code, it creates a fork in the blockchain: one
path follows the updated blockchain, and the other path continues along the old path,
hence incompatible with each other. After a short duration, those on the old chain will
realize that their version of the blockchain is outdated and quickly upgraded to the
latest version.

10. Bitcoin protocol runs over

i. TCP
ii. UDP
iii. HTTP
iv. HTTPS

a. i, ii, iii
b. i, iv
c. Only i
d. Only ii
Hint: Bitcoin protocol runs over TCP as reliability is required for transactions.
NOC22-CS44: Blockchain and Its Applications
Assignment 5

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. What is the limitation of using the consensus algorithm Proof of Work (PoW)?
a. A lot of mining power is wasted as only one gets success in mining at a time
b. PoW is used for permissioned blockchain
c. Low transaction throughput
d. It is used for blockchain mining

Hint: Please refer to the slide Week 5 slide. The PoW has limitation of wastage of
power and low throughput.

2. Which statement(s) is/are true for PoS(Proof of Stake) consensus?


a. Depends on the work done by the miner
b. Depends on the amount of crypto currency the miner holds
c. Provides less protection in general
d. None of the above

Hint: Refer to the Week 5 Lecture slide for description of PoS. Amount of bitcoin that
the miner holds decides its stake.

3. Which of the following is/are applicable for PoET(Proof of Elapsed Time) consensus
a. Each participant in the blockchain network waits a random amount of time
b. The first participant to finish becomes the leader for the new block
c. Trusted execution platform and attestation are used to verify that the proposer
has really waited
d. None of the above.

Hint:POET uses a trusted execution platform, say as Intel SGX and H/W attestation.
Please refer to the slide for details.

4. Proof of Burn consensus algorithms do not consider virtual resources or digital coins
for participating in the mining activity?
a. True
b. False

Hint: Proof of Burn consensus algorithms consider virtual resources or digital coins
for participating in the mining activity unlike PoW which uses real resources.

5. 5 ether equals
a. 5X(10 ^ 16) wei
b. 5X(10 ^ 8) wei
c. 5X(10 ^ 6) wei
d. 5X(10 ^ 18) wei
Hint: Ether to Wei converter: https://eth-converter.com/.

6. Which of the following syntax is correct to write data in a smart contract using solidity
a. myContract.methods.store("99").set()
b. myContract.methods.store("99").send()
c. myContract.methods.write("99").send()
d. myContract.methods.write("99").set()
Hint: Please refer to the Week 5 Lecture slides on how to execute smart contract.

7. How an attacker could manipulate the transaction history of a blockchain to be able


to spend a token or a cryptocurrency twice.
a. The attacker hard-forked the network and created a new blockchain network.
b. The attacker modified the transaction on his node and propagated it in the
network.
c. The attacker modified the smart contract and recovered the investor's
cryptocurrency.
d. The attacker gained control of more than 51% of the network’s computing
power.
Hint: Refer to the Week 5 Lecture slide for 51% attack.

8. What library/API is used for smart contract deployment and invocation from Dapp ?
a. Contract
b. web3
c. admin
d. eth
Hint: web3 is the Collection of libraries that allow you to interact with a local or
remote ethereum nodes

9. What is the CLI command used to send ethers after the nodes have been initialized?
a. eth.submitTransaction()
b. eth.sendIBANTransaction()
c. eth.sendRawTransaction()
d. eth.sendTransaction()
Hint: Once the transaction is prepared using syntax
var transaction = {from: "0x7dad3a076678a05b2b4e2b93206dbecef0d7b0",
to:"0x35F18427567108F800BDC2784277B9246eED3A" ,
value: Web3.utils.numberToHex(10000000000000000) },
it can be sent using:
web3.eth.sendTransaction(transaction).then(console.log)

10. In which scenario is a smart contract the best solution to the problem?
a. A restaurant manager wants to force customers to pay for their food by
transferring cryptocurrency to his wallet.
b. A chief engineer wants her smart watch to notify her when her partner enters
their front door.
c. A grid company wants to automatically buy power when the price reaches a
predetermined rate.
d. An insurance company wants to pay out a small vendor whenever the case
manager feels it is best to do so.
Hint:
Option a is incorrect. Because Smart contracts do not force another party to transfer
funds.
Option b is incorrect. Because a smart contract is a contract between two or more
parties. Here, there is no second party, hence a smart contract is not suitable.
Option d incorrect. Because, Smart contracts get triggered by events that are
predetermined. The willingness of a company does not automatically trigger the
code.
NOC23-CS44: Blockchain and Its Applications
Assignment 6

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. If there are 24 faulty nodes (crash fault) in asynchronous CFT, at least how many
nodes needed to reach consensus
a. 48
b. 49
c. 50
d. 51

Detailed Solution:
2f + 1 = 2*24 + 1 = 48 + 1 = 49

2. In Paxos, a node can have only one role among the three roles​at a time. True or
False
a. False
b. True

Detailed Solution:
In typical paxos implementations, a single processor may play more
than one role at the same time.

3. Can we reach a consensus when there is one commander, one good lieutenant, and
one faulty ​lieutenant in a .Byzantine Generals Problem​. Yes or No?
a. Yes
b. No

Detailed Solution:
One fault.
Total nodes required = 3f + 1 = 3 + 1 = 4 . But we have 3 nodes.

4. If there are 24 faulty nodes in, at least how many nodes needed to reach consensus
in the Byzantine Fault Tolerance (BFT) system​.
a. 72
b. 73
c. 48
d. 49

Detailed Solution:
f = 24
Total nodes required = 3f + 1 = 72 + 1 = 73
5. Which are the examples of the synchronous consensus techniques?
a. RAFT
b. PAXOS
c. Byzantine General Model
d. Practical Byzantine General Model

Detailed Solution:
RAFT, PAXOS, Byzantine General Model and PBFT , all are synchronous
consensus techniques.

6. Which of the following is false for single Paxos


a. Paxos runs based on state machine replication
b. Proposers and Acceptors maintain a state of the running epochs
c. Once a consensus is reached, single Paxos consensus progresses to
another consensus of the value.
d. None of the above

Detailed Solution:

c is the answer. For single Paxos once a consensus is reached single


Paxos does not progress to another consensus of the value unlike
multiple Paxos. Please refer to the week 6 slide for details.

7. Which are the properties of an asynchronous consensus:


a. Validity
b. Agreement
c. Termination
d. Integrity

Detailed Solution:
All the options are correct.

Validity: If all correct process proposes the same value v, then

any correct process decides v

Agreement: No two correct processes decide differently.

Termination: Every correct process eventually decides.

Integrity: If all the correct processes proposed the same value v, then any
correct process must decide v. ( Same as validity )

8. Which of the following is true for the permissioned model of blockchain?


a. Participants are pre-authorized
b. Membership Service providers help to obtain membership of the
corresponding network
c. Security and consensus need to be established
d. All of the above

Detailed Solution:
Please refer to the week6 slides. In permissioned blockchain all the
above are true.

9. Which of the following is/are true for smart contracts on a closed network?
a. Contract is stored on a blockchain ledger
b. Once an event is triggered, execute the codes locally on peers
c. Generate transactions as the output of execution of contract
d. The peers of the blockchain network validates the transactions and
transactions are committed after successful validation.

Detailed Solution:
Please refer to the week6 slides. For smart contracts on a closed
network all the above are true.

10. Which of the following is/are true for basic Multi-Paxos


a. Applications often needs a continuous stream of agreed values
b. Run Multiple instances of Paxos with different round number
c. If a value has been accepted for a round process further accept requests for
different value in that round
d. All of the above

Detailed Solution:

Refer to Week6 slides - Paxos. In general for basic Multi Paxos if for a round, a
value is accepted, further change requests on that value in that round are
rejected.
NOC23 Blockchain and Its Applications
Assignment 7

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Which statement(s) is/are false for practical distributed decentralized network


assumptions: ​
a. Communication channel can be unreliable
b. The network may not be fully Connected
c. Receivers can not always know the identity of the Senders
d. None of the above

Detailed Solution:
Please refer to Lecture notes; decentralized system can have unreliable,
partially connected networks with all of the participating parties, may
not be known to all

2. Which of the following is/are true for PBFT (Practical Byzantine Fault Tolerance).

a. PBFT gives priority to safety over liveliness.


b. Use digital signature
c. Based on State machine replication
d. In general low overhead is associated

Detailed Solution:
Please refer to Lecture notes, all of the above are true for PBFT.

3. PBFT can use cryptographic techniques for authentication and authorization.


a. True
b. False

Detailed Solution:
Please refer to Lecture notes, PBFT uses cryptographic techniques for
signing and authentication.

4. Which of the following is/are true for the view in PBFT?


a. One replica in a view is considered as the primary (works like a
b. The primary proposes a value, and the backups accept the value Acceptors)
c. When the primary is detected as faulty, the view is changed and a new
leader/primary is elected
d. Only the messages from the current view are accepted
Detailed Solution:
All of the above are correct. Please refer to Lecture notes for PBFT uses
primary and backup view configuration. The primary works as proposer
and in case of fault a new primary is elected.

5. Is Hyperledger Fabric used for invoking smart contracts in public blockchain in its basic
form?
a. True
b. False

Detailed Solution:
Please refer to Lecture notes, Fabric is primarily used for building
permissioned blockchains for organizations. It is an open source project so
anyone can use it to build a permissioned blockchain and deploy smart
contracts on it.

6. Which of the following is an open source, enterprise-grade​Permissioned DLT platform​


a. Hyperledger Explorer
b. Hyperledger Burrow
c. Hyperledger Fabric
d. Hyperledger Indy

Detailed Solution:
Only Fabric is an enterprise-grade permissioned DLT Platform.
Explorer is a tooling to inspect blockchains.
Burrow is not an enterprise grade DLT since it uses EVM which has
certain limitations in developing smart contracts.
Indy is a specialized DLT for identity management.

7. Which of the following abstractions in Hyperledger Fabric provide confidentiality to


individual ledgers ?
a. Ordering Services
b. Peers
c. Channels
d. Endorsement Policies
Detailed Solution:
Refer to Lecture 35: Fabric channels refer to different separate ledgers
such that only organizations belonging to a particular channel can
read/write to that ledger.
8. Suppose there are 5 channels present in a Hyperledger Fabric network, each of them
has access to 3 chaincodes A, B and C. How many containers will run in each peer for
running this system?
a. 5
b. 1
c. 3
d. 15

Detailed Solution:
Per peer 3 containers will be running, that is one for each chaincode.

9. Hyperledger Fabric allows any consensus to be plugged in to ensure a high degree of


trustworthiness. True or False
a. True
b. False

Detailed Solution:
Hyperledger fabric is modular, and the consensus protocol is a pluggable
component. Therefore any consensus protocol such as PBFT or Proof of Work
can be plugged in and used.

10. Which of the following(s) is/are benefits of Blockchain for Business​


a. Reduced transaction time from days to near instantaneous
b. Removes intermediaries​o
​ verheads and cost
c. Enables NewBusiness Models​such as IoT Integration into supply chain​
d. All of the these

Detailed Solution:
Refer to Lecture 33. The benefits of enterprise blockchains include
reduced transaction time, removal of intermediaries, and new business
models such as IoT integration in supply chain.
NOC23-CS44: Blockchain and Its Applications
Assignment 8

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Which of the following is/are true for Proof Of Work) PoW protocol
a. Open environment
b. Scalable
c. Transaction Per second (TPS) is low in general in comparison to
permissioned protocol
d. None of the above
Detailed Solution: Please refer to slides. PoW works in an open environment with
lots of nodes, scalable and slow in comparison to permissioned protocols in general.So
the options a,b,c are true.

2. Which of the following is/are true for scalable witness cosigning protocol?
a. protect authorities and their clients from undetected misuse
b. ensuring that every authoritative statement is validated
c. It can used to sign a message by multiple authorities collectively
d. none of the above

Detailed Solution: cosigning protocol supports collective signing and publicly


logging them by witnesses. So the options a,b,c are true. For details, please refer to the
slides.

3. Which statement(s) are true about Byzantine Dissemination Quorum: ​

i. Any 2 quorums have at least one correct replica in common


ii. If you have 3 numbers of faulty nodes you need at least 10 replicas to reach
consensus.
iii. Any 2 quorams have at most one correct replica in common
iv. PBFT uses Byzantine Dissemination Quorum with 2f + 2 replicas
a. i, ii
b. ii, iv
c. Only ii
d. Only iv
Detailed Solution: To reach consensus with f number of faulty nodes, you need at
least 3f + 1 replicas
4. Alice wants to interact with an Ethereum Network​. Which of the following are required to
do that?
a. web3.js
b. nodejs
c. geth
d. bitcoin
Detailed Solution:: Refer to Lecture 36:
When a user wants to Interact with an Ethereum Network it is required to have a
web app and a node with geth installed.

5. The command : geth –goerli --syncmode "fast" will


a. Will downloads all blocks excluding headers, transactions, and receipts and
will generate the state of the blockchain incrementally by executing every
block.​
b. Will downloads all blocks including headers, transactions and receipts, will
verify all headers, and downloads the state and verify it against the headers.​
c. Will downloads all blocks including headers, transactions, and receipts and
will generate the state of the blockchain incrementally by executing every
block.
d. Will downloads all block headers, block data, and verifies some randomly.​
Detailed Solution: Refer to Lecture 36:
Sync modes You can start Geth in one of three different sync modes using the
syncmode "<mode>" argument that determines what sort of node it is in the
network

6. Which of the following is an open, scalable consensus algorithm having low


transaction throughput?
a. PoW
b. PoS
c. PBFT
d. PoB
Detailed Solution: Refer to Lecture 38

7. In basic form PBFT has higher transaction throughput than PoW


a. False
b. True
Detailed Solution: PBFT works in closed environments and is faster.

8. Which of the below statements is true?


a. PoW is a non-randomized protocol
b. BFT protocols ensure total ordering of transactions
c. PoW can always ensure consensus finality
d. None of the above
Detailed Solution: PoW is randomized and need not ensure finality. For details,
please refer to the slide.

9. BFT protocol ensures finality in general.


a. False​
b. True
Detailed Solution: BFT protocols commit blocks based on transaction ordering
and ensure finality. For details, please refer to the slide.

10. Hyperledger Fabric allows pluggable implementations of consensus algorithm to ensure


a high degree of confidentiality, resiliency and scalability. True or False
a. False
b. True
Detailed Solution: Hyperledger Fabric supports pluggable implementations of
different components such as identity management, consensus algorithm etc to ensure
confidentiality, resiliency and scalability.
NOC22-CS44: Blockchain and Its Applications
Assignment 9

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Which of the following statements is true for Byzantine Fault Tolerant (BFT) protocol.
a. The system should work correctly even in presence of malicious users within
the defined limit of faulty nodes.
b. BFT Protocol is used generally in a permissioned system in its basic form.
c. RAFT is a type of BFT protocol
d. None of the above

Detailed Solution:BFT can perform in the system with malicious nodes within
specified limit, RAFT is Crash Fault Tolerant. So a,b are true. For details please refer
to slides.

2. Algorand in general is safe under weak synchrony.


a. True
b. False

Detailed Solution: Algorand protocol is safe under weak synchrony. Please


refer to slides for details.

3. Which of the following is/are applicable for standard Algorand


a. Forking issue not present
b. Highly scalable
c. Need large network to perform optimally
d. Uses random committee

Detailed Solution: Algorand selects a random committee and is highly scalable


with no forking issues in general. So all options are correct. Please refer to
slides for details.

4. Which of the following is/are true for Single Sign-On(SSO) based systems.
a. Single identity for various purposes
b. One password to access multiple services
c. Single identity provider can maintain the identity
d. None of the above

Detailed Solution: SSO ensures single signing to multiple services. So options


a,b and c are true. Please refer to slides for more details.

5. Which of the following is/are true for Decentralized Identifier (DID)


a. Digital representation of physical identity
b. Individuals can control the usage of their own identity
c. Provides Verifiable presentation of the ID
d. DID helps in trusted data exchange
Detailed Solution: All the options are true. DID provides decentralized
identity which can be based on open standards and can perform verifiable
presentation of the ID when required and maintains trust. For details please
refer to slides.

6. Which of the following is/are true for a DID document.


a. A set of data describing the DID subject
b. Includes cryptographic mechanism
c. Consists mapping of entries
d. None of the above

Detailed Solution: DID describes the subject, uses cryptographic mechanism


and maps as key/value pair. So a,b,c are true.

7. DIDs only allow a DID controller to prove its control over its DID Document.
a. True
b. False

Detailed Solution: Option a is true. Please refer to slide.

8. In Verifiable Credential (VC), a claim is a statement about a


a. Holder
b. Subject
c. Issuer
d. Verifier

Detailed Solution: Option b is true. Please Refer to Lecture Notes.

9. Censoring of data registry is a major problem mainly in centralized systems


a. False
b. True

Detailed Solution: In a centralized system centralized administration control


may introduce hierarchy and censoring. So option b is correct. Please refer to slides
for further details.

10. Which of the following steps is/are valid for DID Registration?
a. Register DID
b. Create DID Document
c. Authenticate DID Controller
d. Update DID Document

Detailed Solution: all of the options are required for DID registration. Please
refer to slides for further details.
NOC23-CS44: Blockchain and Its Applications
Assignment 10

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Alice has an account in the Ethereum network and wants to transfer ETH to Bob who
has an account in the bitcoin network. Is it possible to do so?
a. Yes, it is always possible
b. No it is not possible
c. Yes, possible via a trusted third party
d. ​None of the above
2. One major issue with TTP based Asset Transfer​is, it is very slow. True or False
a. True
b. False
3. One of the advantages of TTP based Asset Transfer is, it is very secure and no
money has been stolen from here till date. True or False?
a. True
b. False
4. What are some of the issues that exist in Asset Exchange?
a. Synchronisation among sender and receiver networks
b. Agreement of exchange rates
c. Denial of Service
d. All of the above
5. Which of the following are guaranteed in the atomic swap protocol ?
a. All swaps will take place only when all parties conform to the protocol
b. If some parties deviate from the protocol, then all conforming party ends up
worse off​
c. No coalition has an incentive to deviate from the protocol​
d. All of the above
6. Can Alice send 1 BTC to its own account using timelocked contract.
a. No the target account should be different from the sender
b. Yes she can send to her own account
c. Only possible if she wants to send more than 1 BTC
d. It depends on the time value mentioned in the contract.

7. Suppose Alice has a timelocked contract as:


Funding Contract - 1 BTC​
Hash: ...Fa4509​
Timeout: 2Δ​
What will happen if Alice refuses to reveal the key and timeout occurs?
a. 1 BTC refunded to Alice​
b. 1 BTC transferred to target account
c. BTC less than 1 refunded to Alice as Some BTC deducted as penalty.
d. ​BTC less than 1 transferred to target account
8. Which of the following statements is valid for Multi-Party Atomic Cross-chain Swap
where Alice, Bob and Carol are the parties​?
a. If Alice halts while contracts are being deployed, then all contracts eventually
time out and trigger refunds​​
b. If Alice halts during triggering of contracts, all the three parties ends up worse
off ​
c. If Bob halts while contracts are being deployed, then Bob’s contracts
eventually time out and trigger refunds
d. If Carol halts during triggering of contracts, only Carol ends up worse off

9. What is an escrow?
a. Escrow is an agreement in which assets are held and distributed when
conditions are met
b. Escrow is payment for smart contracts
c. Escrow is a permissioned blockchain
d. Escrow is cost of execution of smart contracts

10. Which of following statements are the true for PBFT


a. It requires a dynamic consensus group ​
b. For scalability it requires O(n) for communication complexity​
c. create multiple pseudonymous identities to subvert the 3f+1 requirements of
PBFT​
d. None of these
NOC22-CS44: Blockchain and Its Applications
Assignment 11

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Hyperledger Aries is used for transmitting verifiable digital credentials.


a. False
b. True

Detailed Solution: Hyperledger Aries is used for exchanging digital identities.


Please refer to the slides for further details.

2. Which of the following is true about Hypeledger Aries?


a. Aries cloud agent exposes API to access Aries capabilities
b. Aries controller implements application business logic
c. The controller sends requests
d. Response events are fed back to the controller as webhooks

Detailed Solution: All of the options a,b, c, and d are true for Aries architecture.
Please refer to the slides for more details.

3. Which of the following is not a risk for blockchain operations?


a. 51% vulnerability
b. Private key security
c. Double spending
d. None of the above

Detailed Solution: All of the options a,b, and c are risks in blockchain use.
Please refer to the slides for details.

4. Selfish mining attacks cause forking problems in the network.


a. True
b. False

Detailed Solution: selfish mining creates forks in the blockchain network. So


option a is true.

5. Which of the following is/are true for Eclipse Attack.​


a. The Attacker partitions miners
b. The attacker re-populates the victim node's peer tables
c. The victim node restarts and loses current outgoing connections
d. The victim establishes all new outgoing connections to attacker IP addresses

Detailed Solution: In Eclipse Attack, the attacker partitions the network and
populates peer tables with attacker IPs so that the victim node only connects to the
attacker IPs. So all the options are true. Please refer to the slides for more details.
6. Attacker can perform a front-running attack if he/she knows about upcoming
transactions?
a. False
b. True

Detailed Solution: in front running attack attacker utilises the prior knowledge
for manipulation. So option b is correct. Please refer to the slides for more details.

7. Blockchain Trust is mainly controlled by which of the following?


a. Consensus
b. Immutability
c. Provenance
d. Finality
Detailed Solution: All of the above options are true. Please refer to the slides
for more details.

8. For defining enterprise-level blockchain, which of the below factors need to be


analyzed?
a. Network
b. People
c. Assets
d. Transactions

Detailed Solution: All of the above options are true for defining an enterprise-level
blockchain strategy. Please refer to the slides for more details.

9. In which of the following cases a node stops responding?


a. Power failure
b. Network failure​
c. Security updates
d. ​DoS attacks

Detailed Solution: in all the above case network can suffer and stops
responding.

10. What is a major problem with Proof of Work in a large-scale network?


a. It is difficult to implement
b. It is Resource-intensive and consumes enormous amounts of power
c. Multiple miners have to be rewarded
d. It is unreliable

Detailed Solution: Proof of Work is based on solving complex mathematical


puzzles to validate the transaction. For this, powerful computers are required, and
inherently they consume a lot of energy. So option b is correct.
NOC22-CS44: Blockchain and Its Applications
Assignment 12

Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.

1. Blockchain has been used in many Electronic Health Record based use cases.
a. False
b. True

Detailed Solution:It is one of the use cases of blockchain networks.

2. In public blockchain the identity of the participants are not always known.
a. True
b. False

Detailed Solution:Public blockchain is open. Anyone can join the network. So


the option a is true

3. Which of the following is/are advantages of blockchain?


a. Provides a decentralized platforms and marketplace
b. Can avoid intermediaries
c. Reduced cost of transactions
d. Better transparency

Detailed Solution:All of the above is correct. Please refer to slides for further
details.

4. Which of the following is/are true for federated voting ?


a. Nodes participate in voting process
b. Keep on voting any valid statement
c. Accept when a majority votes
d. Confirm when the quorum unanimously accepts a statement

Detailed Solution: For federated voting all of the options are correct. Please
refer to slides for further details.

5. Ubin project is based on Blockchain and Distributed Ledger Technology (DLT) for
clearing and settlement of payments and securities
a. True
b. False
Detailed Solution: Ubin project uses Blockchain DLT for payment clearing and
settlement. So option A is true.

6. In which of the attacks, end-user consumers can create multiple accounts/identities


for accessing the consortium services?
a. Byzantine faults
b. Sybil attacks
c. Impersonation attacks
d. Sensitive information Leakage
Refer to Week 12 slide for Threat Model

7. To allocate consumer requests among Service Providers, which of the following


scheduling algorithms is implemented?​
a. Fair Scheduling Algorithm
b. Capacity Scheduling Algorithm
c. Dynamic Round Robin
d. A* Algorithm

In Cloud Federation to allocate consumer requests among Service Providers,


Fair scheduling algorithm is implemented. Each SP will be allocated the
number of consumer requests proportional to its infrastructure contribution in
the federation.

8. Quorum supports transactions with


a. Only private state
b. Only public state
c. Both private and public state at the same time
d. Either private or public state for a transaction

In Quorum a transaction has to be either public or private. If the transaction is


private all the data within that transaction is private for that set of entities in
the blockchain. Public transactions are transactions where the payload is
visible to all participants.

9. Which of the following is true about the selection of the random committee in the
Algorand network?
a. There is a dedicated node which chooses the nodes to form the committee
b. A distributed algorithm decides the list of nodes participating in the committee
c. The nodes elect themselves as a committee member by winning a local
computation
d. A specific pool of node choose are given the responsibility of forming the
committee
The nodes elect themselves as a committee member by winning a local
computation which makes the protocol to have good performance while
allowing anyone in the network to participate.

10. What are the advantages of Hyperledger?


a. Open source
b. Identities of parties must be known
c. Private channels
d. None of the above
In Hyperledger, identities of parties are not required to be known apriori.

You might also like