0% found this document useful (0 votes)
593 views37 pages

General Blockchain Interview Questions

The document discusses blockchain technology and answers 24 questions related to blockchain. It covers topics such as the differences between Bitcoin and Ethereum blockchains, the principles blockchain is based on, types of blockchains, why blockchain is a trusted approach, components of blockchain like blocks and transactions, how blockchain differs from traditional databases, properties of blockchain like decentralization and security, role of encryption in blockchain, how blocks are identified and modified in blockchain, common types of ledgers in blockchain, components of blockchain ecosystem, differences between proof-of-work and proof-of-stake, popular platforms for developing blockchain applications, and double spending in blockchain.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
593 views37 pages

General Blockchain Interview Questions

The document discusses blockchain technology and answers 24 questions related to blockchain. It covers topics such as the differences between Bitcoin and Ethereum blockchains, the principles blockchain is based on, types of blockchains, why blockchain is a trusted approach, components of blockchain like blocks and transactions, how blockchain differs from traditional databases, properties of blockchain like decentralization and security, role of encryption in blockchain, how blocks are identified and modified in blockchain, common types of ledgers in blockchain, components of blockchain ecosystem, differences between proof-of-work and proof-of-stake, popular platforms for developing blockchain applications, and double spending in blockchain.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

UNIT – 1

General Blockchain Interview Questions


Q 1. What do you know about Blockchain? What is the difference
between Bitcoin blockchain and Ethereum blockchain?

The blockchain is a decentralized distributed database of immutable records. The


technology was discovered with the invention of Bitcoins(the first cryptocurrency). It’s
a trusted approach and there are a lot of companies in the present scenario which
are using it. As everything is secure, and because it’s an open-source approach, it
can easily be trusted in the long run.

Bitcoin Blockchain and Ethereum Blockchain


Topics Bitcoin Ethereum
Concept Digital Currency Smart Contracts
Founder Satoshi Nakamoto Vitalik Buterin
Release Method Genesis Block Mined Presale
Cryptocurrency Used Bitcoin(Satoshi) Ether
Algorithm SHA-256 Ethash
Blocks Time 10 Minutes 12-14 Seconds
Scalable Not yet Yes
Q 2. What is the principle on which blockchain technology is based
on?

It enables the information to be distributed among the users without being copied.

Q 3. What are the different types of Blockchains?

Blockchains are of three types: 


Q 4. Why is Blockchain a trusted approach?

 Blockchain can be trusted due to so many reasons.


 Its compatibility with other business applications due to its open-source
nature.
 Its security. As it was meant for online transactions, the developers have paid
special attention to keeping up the pace when it comes to its security.
 It really doesn’t matter what type of business one owns, Blockchain can easily
be considered.

Q 5. Name the two types of records that are present in the blockchain
database?

These records are block records and transactional records. Both these records can
easily be accessed, and the best thing is, it is possible to integrate them with each
other without following the complex algorithms.

Q 6. Blockchain is a distributed database. How does it differ from


traditional databases?

Properties Blockchain Traditional Database


 Can perform C.R.U.D.
Operations Only Insert Operations
operations
Full Replication of block Master Slave
Replication
on every peer Multi-Master 
Majority of peers agree on
 Distributed Transactions
Consensus the outcome of
(2 phase commit)
transactions
Anybody can validate
Invariants transactions across the  Integrity Constraints
network
Q 7. What are the properties of Blockchain?

There are four key features of blockchain:

 Decentralized Systems
 Distributed ledger
 Safer & Secure Ecosystem
 Minting

Q 8. What is encryption? What is its role in Blockchain?

Data security always matters. Encryption is basically an approach that helps


organizations to keep their data secure.
The encrypted data is encoded or changed up to some extent before it is sent out of
a network by the sender and only authorized parties can access that information.In
Blockchain, this approach is useful because it simply adds more to the overall
security and authenticity of blocks and helps to keep them secure.

Q 9. What do you mean by blocks in blockchain technology?

Blockchain consists of a list of records. Such records are stored in blocks. These
blocks are in turn linked with other blocks and hence constitute a chain called
Blockchain.

Q 10. How does a block is recognized in the Blockchain approach?

Every block in this online ledger basically consists of a hash pointer which acts as a
link to the block which is prior to it, transaction data and in fact a stamp of time.

Q 11. Is it possible to modify the data once it is written in a block?

No, it’s not possible to do so. In case any modification is required, the organization
simply has to erase the information from all other blocks too. It is because of no
other reason than this, data must be given the extreme care of while using this
approach.
Q 12. What are Block Identifiers?

In Blockchain, blocks can be identified by the block header hash and the block


height.

Q 13. Is it possible in Blockchain to remove one or more block from


the networks?

Yes, it can be done. There are times when only a specific portion of this online
ledger is to be considered. With the help of default options and filters, this can easily
be done without making a lot of efforts.

Q 14. What exactly do you know about the security of a block?

Well, a block or the entire blockchain is protected by a strong cryptographic hash


algorithm. Each block has a unique hash pointer. Any modification in the block
constituents will result in the change in the hash identifier of the block.   Therefore, it
offers an excellent level of security. Thus, one needs not to worry about the safety as
well as the security of data that is present in a block.

Q 15. What are Merkle trees? How important are Merkle trees in
Blockchains?

Merkle Tree also known as ‘hash tree’ is a data structure in cryptography in which
each leaf node is a hash of a block of data, and each non-leaf node is a hash of its
child nodes.

The benefit of using the Merkle Tree in blockchain is that instead of downloading
every transaction and every block, a “light client” can only download the chain of
block headers.
Blockchain Certification Training

 Instructor-led Sessions
 Real-life Case Studies
 Assignments
 Lifetime Access

Explore Curriculum

Also, if someone needs to verify the existence of a specific transaction in a block,


then he doesn’t have to download the entire block. Downloading a set of a branch of
this tree which contains this transaction is enough. We check the hashes which are
just going up the branch (relevant to my transaction). If these hashes check out
good, then we know that this particular transaction exist in this block.

Q 16. What is a ledger? Is Blockchain an incorruptible ledger?

Blockchain is considered incorruptible. Any ill-intentioned individual acting alone is


powerless. “To take over the network, an attacker would have to control more than
50 percent of its total computing power,” Augier explains. “We hope that’s a
theoretical scenario, but we can’t be sure. Should it happen, the individual would
take every precaution to avoid being noticed.” Not to mention the energy required to
power the computers needed for the blockchain system to work.

Q 17. Name the common type of ledgers that can be considered by


users in Blockchain?
These are:

Q 18. How is a blockchain ledger different from an ordinary one?

The first and in fact the prime difference is Blockchain is a digital ledger that can be
decentralized very easily. The chances of error in this approach are far less than that
in an ordinary ledger. An ordinary ledger is what that is prepared by hands or by
human efforts while the Blockchain performs all its tasks automatically. You just
need to configure it in a proper manner and by following all the guidelines.

Q 19. What type of records can be kept in a Blockchain? Is there any


restriction on same?

There is no restriction on keeping records of any type in the Blockchain approach.


Industries are using Blockchain for securing all types of records.

The common types of records (to name a few) that can be kept on the
Blockchains are:

 Records of medical transactions


 Identity management
 Transaction processing
 Business transactions,
 Management activities
 Documentation

Q 20. A distributed digital ledger is used for recording transaction in


Blockchain. What does the system rely on?

The system relies on the network servicing protocol and the nodes of the network.

Q 21. Can You explain the components of Blockchain Ecosystem?


Following are the components of blockchain Ecosystem:

Q 22. State difference between proof-of-work & proof-of-stake?


 
                                                         Proof-of-work vs proof-of-stake
Q 23. Name some popular platforms for developing blockchain
applications

After the development of bitcoin, various blockchain platforms started coming up.
Ethereum came right after the evolution of Bitcoins, and is one of the popular public
platforms for building Blockchain based applications.

Then there is a Hyperledger community for building enterprise-based solutions. Also,


Qtum, IOTA, EOS are some of the widely used platforms for building Blockchain.

Q 24. What is Double Spending? Is it possible to double spend in a


Blockchain system?

It’s a condition when one digital token is spent multiple times because the token
generally consists of a digital file that can easily be cloned. It simply leads to inflation
and organizations must bear a huge loss. One of the primary aims of Blockchain
technology is to eliminate this approach up to the possible extent.

Blockchain prevents double spending by confirming a transaction by multiple parties


before the actual transaction is written to the ledger. It’s no exaggeration to say that
the entirety of bitcoin’s system of Blockchain, mining, proof of work, difficulty etc,
exist to produce this history of transactions that is computationally impractical to
modify.
Q 25. What are the benefits of Blockchain that you know?

Multiple Choice Blockchain Interview Questions


Q 1. Each block of a Blockchain consists of which of the following?

A hash pointer to the previous block


Timestamp
List of transactions
All of the above [Ans]

Q 2. Which of the following is first distributed blockchain implementation?

Bitcoin [Ans]
Ethereum
Q 3. Bitcoin is based on ________ blockchain?

Private
Public [Ans]
Public Permissioned
Permissioned
Q 4. Blockchain can be stored as which of the following?
A flat file
A Database
Both of the above [Ans]
None of the above

Q 5. In blockchain, blocks are linked ________?

Backward to the previous block [Ans]


Forward to next block
Not linked with each other

Q 6. The primary benefit of immutability is…

Scalability
Improved Security
Tamper Proof
Increased Efficiency [Ans]
Q 7. Hash identifying each block in the Blockchain is generated using which of
the following cryptographic algorithm?

SHA128
SHA256 [Ans]

Q 8. A block in the blockchain can never have more than one parent
block?

True [Ans]
False 
Q 9. Blockchain forks can result in which of the following?

Multiple parent blocks


Multiple children blocks [Ans]

Q 10. Which of the following is asymmetric encryption Algorithm?

Blowfish
Twofish
RSA [Ans]
Tripple DEA
Advanced Blockchain Interview Questions
Q 1. Can you tell me some of the widely used cryptographic
algorithms?
 Q 2. Tell me more about RSA algorithm? How secure is this
algorithm?

Security of R.S.A.

There are different approaches used in attacking the RSA algorithm:

 Brute force: It involves all possible secret keys


 Mathematical attacks: In mathematical attack, we are using different
techniques, which is similar in effort to factor the product of two primes
Q 3. Explain the significance of blind signature and how it is useful?

It is a form of digital signature in which the content of a message is disguised


(blinded) before it is signed. The resulting blind signature can be publicly verified
against the original, unblinded message in the manner of a regular digital signature.

Blockchain Certification Training

Watch The Course Preview

Blind signatures are typically employed in privacy-related protocols where the signer
and message author are different parties. Examples include cryptographic election
systems and digital cash schemes.

Q 4. What is Secret Sharing? Does it have any benefit in Blockchain


technology?

It is a well-known fact that security matters a lot in digital transactions. Secret sharing
is an approach meant for same. In Blockchain technology it is an approach that
divides secret or personal information into different units and sent them to the users
on the network.

The original information can only be combined when a participant to whom a share
of the secret is allocated agree to combine them together with others. There are
several security-related benefits it can offer in Blockchain technology.

Q 5. Can you explain what are off-chain transactions?

An off-chain transaction is the movement of value outside of the blockchain. While


an on-chain transaction – usually referred to as simply ‘a transaction’ – modifies the
blockchain and depends on the blockchain to determine its validity an off-chain
transaction relies on other methods to record and validate the transaction.

Q 6. What exactly do you know about executive accounting? Does


Blockchain support the same?

Executive accounting is nothing but a special type of accounting which is designed


exclusively for a business that offers services to the people. There is no strict upper
limit on services and a business can manage any through the executive accounting.
Blockchain has algorithms that are specially meant to handle executive accounting.
In fact, it cut down many problems that are associated with the same.

Q 7. What are the threats to the information you are familiar with?

There are lots of threats to information in the present scenario. Due to increase in
online transactions over the internet, many hackers have become active and are
adopting new approaches to hack information and servers that contain financial
information.

The major threat is software attack, identity theft, information extortion, as well as
sabotage. In addition to this, Trojan horses, worms, and viruses are other trouble
creators.

Q 8. How will you handle the risk management when it comes to


securing the transactions records?

It is basically a process of finding the threats and all the vulnerabilities to the financial
records of an organization. The best thing that can be done with this approach is to
take the right countermeasures against them immediately.

Another approach is to pay attention to a backup plan. Based on the value of


information, more approaches such as buying new risk management software can
simply be considered. The prime risk to information is from black-hat hackers.

Q 9. What is 51% attack? 

51% Attack refers to a situation where a group of miners who hold more than 50% of
the Network Hash Rate could manipulate with the New transactions (Stopping the
transactions to proceed or gaining conformations) or able to reverse the transactions
that were recently confirmed and kind of doing Double spend. It is Highly unlikely to
be able to do that today but it is possible.

Q 10. What challenges information leak can impose on an


organization?

An information leak can cut down the reputation of an organization up to an excellent


extent. In addition to this, it can be the reason for organization bearing huge losses.
Many organizations who fail to implement security protocols to keep their data
secure have already lost the trust of their customers and are struggling very hard to
get the same reputation again. The overall profits of any organization can reduce up
to 80% if no attention is paid to the online transaction security.

Q 11. What is information processing according to you? What are the


key challenges that are associated with it?

The information is often shared on a network. Before actually transmitting it over a


network, it needs to be changed into formats that can fit the standards of the
channels (the channel is a link between the sender and a receiver).
The work done to convert the information at both sender and receiver end is
generally regarded as information processing. The biggest challenge to information
processing is securing it during that time. Another challenge is processing bulk
information can impose a limit on performance.

Q 12. Name organizations that can use Blockchain technology?

There is no strict upper limit on the category of business who can consider this
approach. The fact is almost all the businesses are engaged in online or financial
transactions that they need to make to run the processes smoothly. Large-scale
corporations, financial institutions, private businesses, government departments and
even defense organizations can trust this technology very easily.

Q 13. What are the core requirements for a Business Blockchain?

A business blockchain requires a shared ledger, smart contract functionality, privacy


and trust.

Q 14. What are the key principles in Blockchain that are helpful in eliminating
the security threats that needs to be followed?

Yes, there are a few principles that need to be followed with respect to time. They
are:
1.Auditing
2.Securing applications
3. Securing testing and similar approaches
4. Database security
5. Continuity planning
6. Digital workforce training

All these principles are basic and are easy to implement. They are helpful in making
the transactions records useful.

Q 15. What is a security policy?

A security policy defines what exactly needs to be secured on a system. It bounds a


network user under some core protocols that they all must agree and follow to
enhance the overall security. When it comes to information or financial records of an
organization, multiple security policies are implemented than just one.

Q 16.  Is the Blockchain Different from Banking Ledgers?

Banks and accounting systems use ledgers to track and timestamp transactions. The
difference is that the blockchain is completely decentralized and an open source.
This means that people do not have to rely on or trust the central bank to keep track
of the transactions. The peer-to-peer blockchain technology can keep track of all the
transactions without the fear of having them erased or lost.
Blockchain Certification Training

Weekday / Weekend BatchesSee Batch Details

Furthermore, the blockchain, because of its open-source nature, is more versatile


and programmable than central banking ledgers. If programmers need new
functionality on the blockchain, they can simply innovate on top of already existing
software through consensus. This is difficult for central banks because of all of their
regulations and central points of failure.

 Q 17.  Can you list some of the popular consensus algorithms? Why we need
different consensus mechanisms?

Some of the popular consensus algorithms are:

 PBFT (Practical Byzantine Fault Tolerance)


 Proof-of-work
 Proof-of-stake
 Delegated proof-of-stake
 Proof-of-elapsed time

Now, the possible reasons why we need consensus mechanism more than “proof-of-
work” are”

 Different business needs


 Different use cases
 Also:
 Cryptography/Strength of Algorithm
 Regulation requirements
 Implementation
 Performance
 Tokenization
 Security
 Privacy

Q 18. Is there any network specific conditions for using Blockchain


technology in an organization?

There is no specific condition of using it. However, the network must be a peer-to-
peer network under the concerned protocols.  It validates the new block simply and
helps organizations to keep up the pace in this matter without investing in third-party
applications.
Q 19. Name the steps that are involved in the Blockchain project
implementation?

Well, there are total six steps involved in this process and they are:

1. Requirement identification
2. Screen ideas consideration
3. Project development for Blockchain
4. Feasible study on the security
5. Implementation
6. Controlling and monitoring the project

Q 20. Explain a real-life use-case where Blockchain is being used?

Blockchain in Stock Market

Problems in Present Stock Market:

Centralized and expensive

 Depositories and transfer agents are a single point of failure


 Registration, transfer, distribution, scrutineering, courier fees
 The more widely held, the higher the administration costs

Limited Transparency

 Information asymmetry leads to market advantages


 Forged securities still a concern
 Counterparty risk is systemic
How Blockchain solves the problem

The centralized hub can be removed and the blockchain can be used to directly
transfer share ownership between investors.

A ledger updated in minutes could save millions in collateral and settlement costs,


while also automating banks’ creaky and expensive back office systems.
1. A blockchain is a type of?
A. Object
B. Database
C. Table
D. View
View Answer
Ans : B

Explanation: Blockchain is a specific type of database.

2. Blockchains store data in the form of?


A. line
B. circle
C. block
D. rhombus
View Answer
Ans : C

Explanation: It differs from a typical database in the way it stores information;


blockchains store data in blocks that are then chained together.

3. In Bitcoin case, blockchain is used in a __________way.


A. decentralized
B. centralized
C. Both A and B
D. None of the above
View Answer
Ans : A

Explanation: In Bitcoins case, blockchain is used in a decentralized way so that no single


person or group has control—rather, all users collectively retain control.

4. Decentralized blockchains are immutable?


A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A
Explanation: True, Decentralized blockchains are immutable, which means that the data
entered is irreversible. For Bitcoin, this means that transactions are permanently
recorded and viewable to anyone.

5. A blockchain, originally block chain, is a growing list of records,


called blocks, that are linked using?
A. Timestamp
B. hash
C. Merkle tree
D. Cryptography
View Answer
Ans : D

Explanation: A blockchain, originally block chain, is a growing list of records, called


blocks, that are linked using cryptography.

6. Who first proposed a blockchain-like protocol?


A. Stuart Haber
B. W. Scott Stornetta
C. David Chaum
D. Dave Bayer
View Answer
Ans : C

Explanation: Cryptographer David Chaum first proposed a blockchain-like protocol in his


1982 dissertation "Computer Systems Established, Maintained, and Trusted by Mutually
Suspicious Groups.

7. The first blockchain was conceptualized by a person (or group of


people) known as Satoshi Nakamoto in?
A. 2005
B. 2008
C. 2006
D. 2004
View Answer
Ans : B

Explanation: The first blockchain was conceptualized by a person (or group of people)
known as Satoshi Nakamoto in 2008.
8. Which of the following statement is true about blockchain?
A. A blockchain is a decentralized, distributed, and oftentimes public, digital
ledger consisting of records called blocks
B. A blockchain database is managed autonomously using a peer-to-
peer network and a distributed timestamping server
C. A blockchain has been described as a value-exchange protocol.
D. All of the above
View Answer
Ans : D

Explanation: All of the above statement are true.

9. Blocks hold batches of valid transactions that are hashed and


encoded into a?
A.  merkle tree
B.  cryptographic hash
C. genesis block
D. temporary fork
View Answer
Ans : A

Explanation: Blocks hold batches of valid transactions that are hashed and encoded into
a Merkle tree.

10. The block time is the average time it takes for the network to


generate one extra block in the blockchain.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A

Explanation: True, The block time is the average time it takes for the network to
generate one extra block in the blockchain.
Bitcoin MCQ Questions And
Answers
This section focuses on "Bitcoin" in Blockchain. These Multiple Choice
Questions (MCQ) should be practiced to improve the Blockchain skills
required for various interviews (campus interviews, walk-in interviews,
company interviews), placements, entrance exams and other competitive
examinations.
1. The Bitcoin was introduced in this world by?
A. Stuart Haber
B. W. Scott Stornetta
C. Satoshi Nakamoto
D. Dave Bayer
View Answer
Ans : C

Explanation: The Bitcoin was introduced in this world by Satoshi Nakamoto through a
research-style white paper entitled Bitcoin

2. Bitcoin is a cryptocurrency invented in?


A. 2007
B. 2008
C. 2009
D. 2010
View Answer
Ans : B

Explanation: Bitcoin is a cryptocurrency invented in 2008 by an unknown person or


group of people using the name Satoshi Nakamoto and started in 2009 when its
implementation was released as open-source software.

3. Bitcoins are created as a reward for a process known as?


A. mining
B. wallet
C. bubble
D. ledger
View Answer
Ans : A

Explanation: Bitcoins are created as a reward for a process known as mining

4. Transactions ar verified by network nodes through cryptography


and recorded in a public distributed ledger called a ?
A. cryptocurrency wallet
B. blockchain
C. nodes
D. cryptocurrency
View Answer
Ans : B

Explanation: Transactions are verified by network nodes through cryptography and


recorded in a public distributed ledger called a blockchain.

5. Which hash function used in Ledger?


A. SHA-64
B. SHA-128
C. SHA-256
D. SHA-512
View Answer
Ans : C

Explanation: SHA-256 hash function used in Ledger.

6. What is the block time of the ledger?


A. 5 mins
B. 8 mins
C. 2 mins
D. 10 mins
View Answer
Ans : D

Explanation: 10 minutes is the block time of the ledger.

7. Nakamoto implemented the bitcoin software as open-source code


A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A

Explanation: Nakamoto implemented the bitcoin software as open-source code and


released it in January 2009.

8. To claim the reward, a special transaction called a?


A. nonce
B. online wallets
C. hardware wallet
D. coinbase
View Answer
Ans : D

Explanation: To claim the reward, a special transaction called a coinbase is included


with the processed payments.

9. Which of the following statement is true about bitcoin?


A. There is no central server; the bitcoin network is peer-to-peer
B. There is no central storage; the bitcoin ledger is distributed
C. The ledger is public; anybody can store it on their computer
D. All of the above
View Answer
Ans : D

Explanation: All of the above statement are true.


10. Bitcoin have a central authority?
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : B

Explanation: Bitcoin does not have a central authority


Public Key Cryptography MCQ
Questions And Answers
This section focuses on "Public Key Cryptography" in Blockchain. These
Multiple Choice Questions (MCQ) should be practiced to improve the
Blockchain skills required for various interviews (campus interviews, walk-in
interviews, company interviews), placements, entrance exams and other
competitive examinations.
1. Public-key cryptography is also known as ?
A. asymmetric cryptography
B. symmetric cryptography
C. Both A and B
D. None of the above
View Answer
Ans : A

Explanation: Public-key cryptography is also known as asymmetric cryptography.

2. Which of the following keys are known only to the owner?


A. public key
B. protected key
C. private key
D. unique key
View Answer
Ans : C

Explanation: public keys, which may be disseminated widely, and private keys, which
are known only to the owner.

3. How many function PKI accomplies?


A. 1
B. 2
C. 3
D. 4
View Answer
Ans : B

Explanation: The PKI accomplies two functions : authentication and the message privacy
through encryption/decryption mechanism

4. PKI stands for?


A. public key infrastructure
B. private key infrastructure
C. public key instance
D. private key instance
View Answer
Ans : A

Explanation: PKI stands for public key infrastructure in which one or more third parties –
known as certificate authorities - certify ownership of key pairs.

5. A communication is said to be insecure where data is transmitted in


a manner that allows for interception also called?
A. attack
B. sniffing
C. ISP
D. citation
View Answer
Ans : B

Explanation: A communication is said to be insecure where data is transmitted in a


manner that allows for interception also called "sniffing".

6. Knapsack problem can be solved by


A. Public key cryptosystem
B. Private key cryptosystem
C. Both A and B
D. Unique key cryptosystem
View Answer
Ans : A
Explanation: The knapsack problem can be solved by public key cryptosystem system
using knapsack vector and data vector.

7. Examples of hash functions are


A. MD5
B. SHA-1
C. Both A and B
D. None of the above
View Answer
Ans : C

Explanation: Some examples of hash functions are MD5 and SHA-1.

8. Which has a key length of 128 bits?


A. IDEA
B. Triple-DES
C. Both A and B
D. RSA
View Answer
Ans : C

Explanation: Triple-DES uses 168 bit key size and IDEA and CAST uses 128 bits key
length.

9. Private key algorithm is used for _____ encryption and public key
algorithm is used for _____ encryption.
A. Messages, session key
B. Session key, messages
C. Can be used for both
D. None of the above
View Answer
Ans : A

Explanation: Private key algorithm is used for encryption of messages and public key
algorithm is used for encryption of session keys.
10. In public key cryptosystem which is kept as public?
A. Decryption keys
B. Encryption keys
C. Encryption & Decryption keys
D. None of the above
View Answer
Ans : B

Explanation: In public key cryptosystem, the encryption keys are kept as public where as
decryption keys are kept as secret.
Hashing MCQ Questions And
Answers
This section focuses on "Hashing" in Blockchain. These Multiple Choice
Questions (MCQ) should be practiced to improve the Blockchain skills
required for various interviews (campus interviews, walk-in interviews,
company interviews), placements, entrance exams and other competitive
examinations.
1. A hash function takes an input string with?
A. numbers
B. alphabets
C. media files
D. All of the above
View Answer
Ans : D

Explanation: A hash function takes an input string (numbers, alphabets, media files) of
any length and transforms it into a fixed length.

2. The fixed-length output is called a ?


A. hash
B. bitcoin
C. data
D. value
View Answer
Ans : A

Explanation: The fixed-length output is called a hash. 

3. A Bitcoin blockchain uses?


A. RSA
B. SHA-128
C. SHA-256
D. All of the above
View Answer
Ans : C

Explanation: A Bitcoin blockchain uses SHA-256 (Secure Hash Algorithm) hashing


algorithm

4. In 2001, SHA-256 Hashing algorithm was developed by the ?


A. DFA
B. CSA
C. ZSA
D. NSA
View Answer
Ans : D

Explanation: In 2001, SHA-256 Hashing algorithm was developed by the National


Security Agency (NSA) in the USA.

5. Message authentication code is also known as


A. key code
B. hash code
C. keyed hash function
D. message key hash function
View Answer
Ans : C

Explanation: Message authentication code is also known as keyed hash function.

6. What is a one-way password file?


A. A scheme in which the password is jumbled and stored
B. A scheme in which the hash of the password is stored
C. A scheme in which the password is XOR with a key and stored
D. A scheme in which the password is passed through a PRF, which is then
stored
View Answer
Ans : B
Explanation: A scheme in which the hash of the password is stored by an operating
system rather than the password itself is the one-way password file system.

7. A larger hash code cannot be decomposed into independent


subcodes.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : B

Explanation: Hash codes can be decomposed into independent subcodes and this was
the logic behind the meet in the middle attack.

8. If the compression function is collision resistant, then so is the


resultant iterated hash function.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A

Explanation: The problem of designing a secure hash function reduces to that of


designing a collision resistant compression function.

9. Which one of the following is not an application hash functions?


A. One-way password file
B. Virus Detection
C. Intrusion detection
D. Key wrapping
View Answer
Ans : D
Explanation: Key wrapping is a separate algorithm and not an application of hash
fuctions.

10. When a hash function is used to provide message authentication,


the hash function value is referred to as
A. Message Field
B. Message Score
C. Message Digest
D. Message Leap
View Answer
Ans : C

Explanation: A hash function providing message authentication is referred to as


massage digest.
Merkle Tree MCQ Questions And
Answers
This section focuses on "Merkle Tree" in Blockchain. These Multiple Choice
Questions (MCQ) should be practiced to improve the Blockchain skills
required for various interviews (campus interviews, walk-in interviews,
company interviews), placements, entrance exams and other competitive
examinations.
1. Merkle Tree is also known as?
A. Hash Tree
B. Trees structure
C. leaf node
D. non-leaf node
View Answer
Ans : A

Explanation: Merkle Tree is also known as Hash Tree.

2. The concept of Merkle Tree is named after?


A. David Merkle
B. John Merkle
C. Ralph Merkle
D. Sturat Merkle
View Answer
Ans : C

Explanation: The concept of Merkle Tree is named after Ralph Merkle

3. Ralph Merkle who patented the idea in?


A. 1975
B. 1972
C. 1983
D. 1979
View Answer
Ans : D

Explanation: Ralph Merkle patented the idea in 1979.

4. The leaf nodes are the ________ node in the tree.


A. top
B. bottom
C. mid
D. None of the above
View Answer
Ans : B

Explanation: The leaf nodes are the lowest node in the tree.

5. This hash is called the?


A. Merkle Root
B. Root Hash
C. Both A and B
D. None of the above
View Answer
Ans : C

Explanation: Merkle trees are created by repeatedly calculating hashing pairs of nodes
until there is only one hash left. This hash is called the Merkle Root, or the Root Hash. 

6. The Merkle Trees are constructed in a?


A. bottom-up approach
B. top-down approach
C. Both A and B
D. None of the above
View Answer
Ans : A

Explanation: The Merkle Trees are constructed in a bottom-up approach.


7. Which of the following uses Merkle Trees structure?
A. Bitcoin
B. Ethereum
C. Both A and B
D. None of the above
View Answer
Ans : C

Explanation: Both Bitcoin and Ethereum use Merkle Trees structure.

8. A Merkle tree stores all the transactions in a block by producing a


digital fingerprint of the entire set of transactions.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A

Explanation: A Merkle tree stores all the transactions in a block by producing a digital
fingerprint of the entire set of transactions. It allows the user to verify whether a
transaction can be included in a block or not.

9. Merkle trees are in a binary tree?


A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A

Explanation: Merkle trees are in a binary tree, so it requires an even number of leaf
nodes.

10. Merkle Root can not be stored in the block header.


A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : B

Explanation: Merkle Root is stored in the block header. The block header is the part of
the bitcoin block which gets hash in the process of mining.

You might also like