KIET Group of Institutions: (Information Technology) Btech, VI Sem
KIET Group of Institutions: (Information Technology) Btech, VI Sem
KIET Group of Institutions: (Information Technology) Btech, VI Sem
Roll No:
a) A type of Cryptocurrency
b) A condiment
c) A type of blockchain
d) A decentralized application
a)A fork
b)A merger
c)A sidechain
d)A division
33. What is the name of the research paper that brought Bitcoin to 2 1 4
the world?
a)Black Paper
b)White Paper
c)Yellow Paper
d)Green Paper
a)Yes – the parties can go back in and alter them at any time.
b) Yes – but only within a certain time frame.
c) No – they cannot be altered.
a)Yes
b)No
a)Finding
b)Panning
c)Sourcing
d)Mining
a) authenticity
b) integrity
c) Non-repudiation
d) All of the above
c) IBM Hyperledger
d) IBM Blockchain
b) A mortgage
c) A car
a) SA private network
c) A new cryptocurrency
b) A cognitive contract
a) Citizen-owned identity
b) Digital currency
d) None of these
A. numbers
B. alphabets
C. media files
D. All of the above
A. hash
B. bitcoin
C. data
D. value
A. DFA
B. CSA
C. ZSA
D. NSA
A. Message Field
B. Message Score
C. Message Digest
D. Message Leap
A. cryptocurrency wallet
B. blockchain
C. nodes
D. cryptocurrency
A. nonce
B. online wallets
C. hardware wallet
D. coinbase
A. TRUE
B. FALSE
A. SHA-64
B. SHA-128
C. SHA-256
D. SHA-512
100 Public and private blockchain have the same set of features 2 2 5
except the permission of peer to work on network.
a) True
b) False
Roll No. :…………………………………….
Course/Branch : B Tech –IT Semester
Subject Name : Blockchain Architecture Design Max. Marks
Subject Code :KIT061
CO-1 : Describe the basic understanding of Blockchain architecture along with its primitive.
CO-2 : Explain the requirements for basic protocol along with scalability aspects.
CO-3 : Design and deploy the consensus process using frontend and backend.
CO-4 : Apply Blockchain techniques for different use cases like Finance, Trade/Supply and Government
activities.
Section A (CO-1)
1. Which of the following can define the concept of distributed shared memory, in the context of distributed
systems?
(a) Combination (logical) of virtual memories of the individual nodes
(b) Combination (logical) of physical memories of the individual nodes
(c) Combination (logical) of secondary memories of the individual nodes
(d) All of the above
Ans b
2. Which of the following properties define the capability of a system to adapt with the increase in the service
load?
(a) Location Transparency
(b) Isolation
(c) Scalability
(d) Atomicity
Ans c
3. Which of the following is the main principle behind the property of isolation in multi-process execution over
an operating system?
(a) Either complete execution or no execution related to a process
(b) All processes will be executed as if it is the only process in the system
(c) A process can enter the critical section when it has obtained the response from all other processes
(d) The system remains consistent before and after executing the process
Ans b
4. Which of the following constitute(s) as the main component(s) of the meta-data for a block in blockchain?
(a) Transaction ID
(b) Previous Block Hash
(c) Merkle Root
(d) Mining Statistics
Ans b,c,d
5. Which of the following is a wrong statement about a cryptographic hash function:
(a) given the same message the hash function would return the same hash
(b) it is difficult to generate the original message from the hash
(c) a small change in the message does not impact the hash
(d) it is difficult to find two different messages with same hash
Ans c
6. Considering Bitcoin, after a new block is mined it is appended to ---
(a) the longest chain with maximum total work done over all the blocks
(b) the longest chain with maximum number of blocks
(c) the longest chain with maximum total amount of transaction done over all the blocks
(d) the longest chain with maximum number of transactions for all the blocks
Ans a
7. Which of the following property ensures that all local copies in the blockchain are updated and consistent?
(a) Privacy
(b) Consensus
(c) Security
(d) Authenticity
Ans b
8. Which of the following is used to ensure consensus in a Permissionless Blockchain Environment?
(a) Proof of Work
(b) Proof of Stake
(c) Paxos Consensus
(d) Byzantine Fault Tolerance
Ans a,b
9. Suppose, you are using RSA algorithm based cryptosystem to securely share the number of marbles that you
have currently with you, among your friends. The private key that you are using is (3,15). Your friends know the
corresponding public key is (11,15). One of your friends wants to share the exact amount of marble content only
to you. What are the maximal possible marbles that your friend can have so that he/she can secretly share that to
you?
(a) 14
(b) 15
(c) 16
(d) No such limit exists
Ans a
10. How does the pseudo-anonymity of a user is maintained in bitcoin?
(a) using the generated unique identifier based on the user’s email address
(b) using the generated unique identifier based on the user’s private key
(c) using the generated unique identifier based on the user’s public key
(d) using the generated unique identifier based on the user’s private and public key
Ans c
11. What is/are the content(s) of the block header in bitcoin?
(a) Merkle root
(b) Previous block header hash
(c) Next block’s Merkle root
(d) Target threshold nBits
Ans a,b,d
12. In distributed consensus, all the non-faulty individuals’ decision must be identical. This property is
(a) Termination
(b) Validity
(c) Integrity
(d) Agreement
Ans d
13. Which of the following components of the block header has to be obtained to satisfy the difficulty posed by
the blockchain network (consider PoW consensus mechanism)?
(a) Merkle tree root
(b) Nonce
(c) Timestamp
(d) Previous block hash
Ans d
14. Considering the Proof of Elapsed Time (PoET) adapted in Hyperledger Sawtooth framework, which of the
following mechanisms is used to ensure that the miner (or block leader) is a legitimate participant and not an
attacker and has waited for the random amount of time assigned by the network?
(a) By verifying the acquired stake that the user has obtained by consuming the given random amount of
time
(b) By verifying the amount of bitcoins send to a verifiable un-spendable address
(c) By ensuring that the trusted regions of the code are run in Trusted Execution Environments (TEE) and
the user cannot tamper it
(d) By ensuring that the nonce is very difficult to obtain and the user wastes enough time for it
Ans c
15. What are the primary assumptions behind a permissioned blockchain network?
(a) No need of consensus
(b) Users are not malicious
(c) Users are known apriori
(d) The network is closed
Ans c,d.
Section B (CO-2)
16. Which of the following ensure ordered sequential execution of transactions in a permissioned blockchain
network?
(a) The incorporation of domain specific language (DSL)
(b) The underlying consensus algorithm
(c) The broadcasted state information
(d) None of the above
Ans b,c.
17. Suppose in a distributed network, running Paxos as the underlying consensus algorithm, has 3 proposers and
5 acceptors and 1 learner. Say, 3 of the acceptors have failed, which of the following is true about the network?
(a) A value gets accepted by default
(b) Someone else becomes proposer
(c) None of the proposers get a reply
(d) A new value gets proposed
Ans c
18. You have deployed 4-nodes at your company for performing your task in a distributed manner. Although
you consider that machine failure (fully failed) is more effective than the compromised failure, you use BFT
model. But somehow an attacker compromises one node and simultaneously another node is permanently failed.
In this situation, does your system correctly work?
(a) Yes with the remaining nodes
(b) Yes with all the nodes
(c) No
(d) All above
Ans c
19. You are planning to deploy a system which will work in a distributed environment. Based on the system
requirement, you need some kind of node identity and fixed size message content representation. However, any
node can transfer the message of any size. Which of the following consensus protocol is extremely suitable for
your system?
(a) PAXOS
(b) RAFT
(c) BFT
(d) PBFT
Ans d
20. In an asynchronous environment with at most f faulty nodes, the minimum number of the similar response
needed for concluding the decision is:
(a) 3f+1
(b) 2f+1
(c) f+1
(d) f
Ans c
21. How does the blockchain model for business differ from bitcoin?
(a) The blockchain based business model uses the append-only system for storing record whereas bitcoin
uses the update-only system. The blockchain based business model provides user-specific accessibility
and data security whereas bitcoin only supports the later part. Anyone can join the bitcoin network, but
only permissioned entities join the enterprise network.
(b) The blockchain based business model uses the append-only system for storing record whereas bitcoin
uses the update-only system.
(c) The blockchain based business model provides user-specific accessibility and data security whereas
bitcoin only supports the later part.
(d) Anyone can join the bitcoin network, but only permissioned entities join the enterprise network.
Ans b,c.
22. Suppose, you are planning to integrate your company’s business processes with a blockchain-based
platform. What are key benefits you would highlight to your business for why a blockchain-based system will
be useful?
(a) The model is used internally to the company so it doesn’t have any risk of fraud.
(b) Blockchain helps automate process and interactions with other businesses, thereby reducing time for
operations. It helps eliminate or reduce the cost of intermediaries.
(c) None
Ans b,c.
23. You are planning to deploy a blockchain solution for your company. For deciding the proper business logic
and the transaction format, you need:
(a) Blockchain Architect
(b) Blockchain Developer
(c) Blockchain Network Operator
(d) Blockchain User
Ans a
24. The data structure World state is used for storing:
(a) the output of all the transactions
(b) the most recent version of the state operated on by transactions
(c) all the information of the recent transactions
(d) all the information of the transactions
Ans b
25. At what stage(s) in the transaction flow can the endorsement policies be validated ?
(a) Proposal Submission to the peers.
(b) Submit Collated Responses to the Orderer.
(c) Orderer creates the block of transactions.
(d) Peer commits the block of transactions.
Ans b,d.
26. Here is the ordered sequence of transactions in a block – T1 (K1=V1, K2=V2), T2(K3=V3),
T3(K2=V4,K4=V4), T4(K5=V1,K6=V2). The (Ki = Vi) values denote keys and corresponding values written
by the transaction. Which of the following transactions in the block would be rejected during validation by the
peer?
(a) T1
(b) T2
(c) T3
(d) T4
Ans c
27. What are the keywords used in the modelling language to define resources?
(a) optional
(b) default
(c) concepts
(d) identity
Ans a,b
28. How many namespaces are allowed in the model definition file?
(a) One per cto file
(b) Many per cto file
(c) One across all cto files
(d) One across bna file
Ans a
29. What command is used to retrieve the certificates of a given user?
(a) composer identity request
(b) composer identity issue
(c) composer identity bind
(d) composer identity list
Ans a
30. What are the different components defined in cto file?
(a) description of events
(b) prototype of transaction processors
(c) description of assets
(d) All of the above
Ans d
Section C (CO-3)
31. The gossip-based data dissemination protocol performs which of the following functions on a Hyperledger
Fabric network :
(a) Manages peer discovery and channel membership
(b) Disseminates only transactions across all peers on a channel
(c) Brings newly connected peers up to speed
(d) Identify invalid blocks on the blockchain
Ans a,c.
32. What is the correct sequence of events to add a new organization to an existing Hyperledger Fabric network?
(a) channel update, update config, fetch channel genesis block, peer join channel
(b) fetch channel genesis block, update config, channel update, peer join channel
(c) update config, channel update, fetch channel genesis block, peer join channel
(d) update config, fetch channel genesis block, channel update, peer join channel
Ans c
33. Which of the following help in providing abstractions in Hyperledger Fabric allow to provide confidentiality
to individual ledgers ?
(a) Ordering Services
(b) Peers
(c) Channels
(d) Endorsement Policies
Ans c
34. Which of the following is not defined in the configtx.yaml of the Hyperledger Fabric Network ?
(a) Number of users per organization
(b) Type of Orderer
(c) Node endpoints
(d) Channel Profiles
Ans a
35. What function do the Orderer’s play in the Hyperledger Fabric Network ?
(a) Verify endorsement policy .
(b) Open and verify the ReadWrite set of transactions.
(c) Order transactions in a block.
(d) Send Block Events to client applications
Ans c
36. Which of the following chaincode transactions not update the ledger ?
(a) Instantiate
(b) Init
(c) Invoke
(d) Query
Ans d
37. What is the role of Hyperledger Composer in an Enterprise Blockchain application?
(a) Provides a way to define the MSP.
(b) Provides a way to define the business transactions.
(c) Provides a way to view the transactions blocks in the blockchain.
(d) Provides a way to configure the blockchain network nodes
Ans b
38. Which of the following is not a component of Hyperledger Composer software?
(a) REST Server
(b) Composer CLI
(c) Hyperledger Fabric
(d) SDK
Ans c
39. The mapping details of the participants and the Hyperledger Fabric identity is stored in:
(a) Participant registry
(b) Identity registry
(c) Access Control List
(d) An external datastore
Ans b
40. What are the examples of public Blockchain Networks?
(a) Ripple
(b) Quorom
(c) Ethereum
(d) Hyperledger Fabric
Ans a,c.
41. Which of the following is not a valid permission level in a Fabric network channel?
(a) Reader
(b) Endorser
(c) Writer
(d) Operator
Ans b
42. Which consensus algorithm is used by Hyperledger Indy?
(a) Redundant Byzantine Fault Tolerance
(b) Practical Byzantine Fault Tolerance
(c) Proof of Stake
(d) Proof of Work
Ans a
43. Which of the following allow for privacy in Hyperledger fabric?
(a) Peers
(b) MSPs
(c) Channels
(d) Smart Contracts
Ans c
44. For performing rich queries on state data in Hyperledger Fabric, which of the following databases can be
used?
(a) LevelDB
(b) CouchDB
(c) Postgresql
(d) All of them
Ans b
45. How the timestamp is maintained in the Audit Trails of the BigChainDB?
(a) By the creation of the transaction using the metadata of the input data
(b) By creating the transaction with a specialized hash
(c) By writing the transaction (created using a hash and metadata) to the blockchain
(d) None
Ans c
Section D (CO-4)
46. What makes a good blockchain use case?
a. There is mistrust between the business entities in the ecosystem
b. There is no transparency within the different departments within the same business entity
c. Current solution does not provide consensus and provenance required by the business process
d. Business network has a single entity for governance
Ans a,c
47. What are the advantages of using blockchain based solutions in Trade Finance?
(a) Automation of business workflow across organizations
(b) Selective view of contract terms and status of goods
(c) Restricted access to the documents used in the business workflow
(d) Inability to modify the contract terms
Ans a,c
48. How will blockchain help in solving the existing issues in KYC process?
(a) Avoid replication of effort
(b) Transition from weekly auditing to daily auditing
(c) Tracking changes to the documents
(d) Validation from Government authorities would not be required
Ans a,c.
49. What are the problems faced in Global Trade Logistics that blockchain can help address?
(a) A single of source information is available using the same format
(b) Stakeholders only have access to their own data
(c) Manual processes are cumbersome and inefficient
(d) Shipments get delayed in transit for a variety of reasons
Ans b,c
50. The Blockchain based solution for Food Traceability and Safety will give the following benefits:
(a) Optimization of business process flow
(b) Reduction of food recalls by increased traceability
(c) Food ownership and transparency
(d) All of the above
Ans d
51. The blockchain can address the errors in the current supply chain by:
(a) Automatically tracking the information and verifying it using the smart contracts
(b) Prevent member organisations from colluding to commit fraud
(c) Maintains synchronised information across member organisations
(d) Allows everyone including non-member organisations to view information and transact on data
Ans a,c
52. How can blockchain help manage data across different levels of governance?
(a) Provide different role-based access policies across different levels
(b) Provide centralized data management at the national level
(c) Provide a way for the data to be altered without colluding majority of the blocks
(d) Provide classification of data based on importance
Ans a,d
53. What are the issues faced during processing of Government Data?
(a) Data Redundancy
(b) Data Thefts
(c) Data Discrepancy
(d) All of the above
Ans d
54. How can blockchain help in resolving the Government’s information sharing system?
(a) All stakeholders have a copy of the entire database
(b) Controls access and verification of central database
(c) Prevents unauthorized alteration of data
(d) Users can directly access the central database
Ans b,c.
55. What are the pitfalls of storing data in a centralized database for Audit and Compliance use case?
(a) The centralized database server can be hacked
(b) The database administrator can tamper the data
(c) The access to the centralized database server can be prevented by putting it behind the firewall
(d) The centralized server will have poor data processing performance
Ans a,b
56. What are the advantages of using Blockchain for Identity Management?
(a) The record keeping agency can over-ride the user’s consent for sharing identity details
(b) User gives consent for sharing identity details
(c) The government controls user identity attributes and profiles
(d) Automated verification of identity through smart contract with revelation of the identity data
Ans b
57. What does non-repudiation mean in terms of security considerations in blockchain platform?
(a) A logic is executed only after it is requested by an authorized entity
(b) Correct and consistent transactions
(c) Entities are accountable and cannot deny transactions they have performed
(d) Scalable to large systems
Ans c
58. Each key block contains the previous block reference as:
(a) Previous key block
(b) Previous microblock
(c) Either previous key block or microblock
(d) Both the previous key block and microblock
Ans c
59. How is validation performed for data written to SideDB?
(a) The private read-write set contains the hash of the keys, and the version corresponding to them is
checked
(b) The private read-write set contains the keys and not the value, and the corresponding version on the
keys is checked
(c) The private read-write set contains both the keys and their values, and the corresponding version is
checked
(d) The private read-write set contains both the keys and the hash of the keys, and the version
corresponding to them are checked
Ans a
60. The smart contracts in CORDA:
(a) Can only be written in kotlin and java
(b) Contract can produce different results in different peers
(c) Can only access the data supplied in the transaction
(d) Transaction can have only a single state
Ans c
Model-2
1. Which of the following industry can use blockchain technology for cybersecurity?
a. Logistics
b. Healthcare
c. Critical Infrastructure
d. All of the above
2. The block time is the average time it takes for the network to generate one extra block in the
blockchain.
a. TRUE
b. FALSE
c. Can be true or false
d. Can not say
3. Public-key cryptography is also known as ?
a. asymmetric cryptography
b. symmetric cryptography
c. Both A and B
d. None of the above
4. In public key cryptosystem which is kept as public?
a. Decryption keys
b. Encryption keys
c. Encryption & Decryption keys
d. None of the above
5. Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
6. Who would be the blockchain network consortium members in the citizen Identity solution?
a. Insurance Companies
b. Government Identity Providers
c. Retail Stores
d. Health Care
7. What data should be the part of the blockchain ledger for property transactions?
a. Property Records (all clearance, certificates etc) along with proof of certification.
b. Bank account details of the buyer and seller
c. Sale deed of the property
d. All of the above
8. Which of these is not a valid example of identity fraud?
9. How does storing data in blockchain help in audit and compliance use case?
a. any changes to the data will be logged in the blockchain.
b. records can be aggregated from multiple departments.
c. both a and b
d. None of the above.
12. What are the advantages of using blockchain for GST collection?
13. How does the blockchain ensure the tampered proof of the data in the defence scenario?
a. only privileged information(no one is accessing information which is not intended for them) has
been accessed by the respective authority.
b. the transaction information written once in the system cannot be modified in the blockchain.
c. None of the above
d. Both a and b
14. How can blockchain help manage data across different levels of governance?
(e) Provide different role-based access policies across different levels
(f) Provide centralized data management at the national level
(g) Provide a way for the data to be altered without colluding majority of the blocks
(h) Provide classification of data based on importance
15. What does non-repudiation mean in terms of security considerations in blockchain platform?
(e) A logic is executed only after it is requested by an authorized entity
(f) Correct and consistent transactions
(g) Entities are accountable and cannot deny transactions they have performed
(h) Scalable to large systems