General Blockchain Interview Questions
General Blockchain Interview Questions
It enables the information to be distributed among the users without being copied.
Q 5. Name the two types of records that are present in the blockchain
database?
These records are block records and transactional records. Both these records can
easily be accessed, and the best thing is, it is possible to integrate them with each
other without following the complex algorithms.
Decentralized Systems
Distributed ledger
Safer & Secure Ecosystem
Minting
Blockchain consists of a list of records. Such records are stored in blocks. These
blocks are in turn linked with other blocks and hence constitute a chain called
Blockchain.
Every block in this online ledger basically consists of a hash pointer which acts as a
link to the block which is prior to it, transaction data and in fact a stamp of time.
No, it’s not possible to do so. In case any modification is required, the organization
simply has to erase the information from all other blocks too. It is because of no
other reason than this, data must be given the extreme care of while using this
approach.
Q 12. What are Block Identifiers?
Yes, it can be done. There are times when only a specific portion of this online
ledger is to be considered. With the help of default options and filters, this can easily
be done without making a lot of efforts.
Q 15. What are Merkle trees? How important are Merkle trees in
Blockchains?
Merkle Tree also known as ‘hash tree’ is a data structure in cryptography in which
each leaf node is a hash of a block of data, and each non-leaf node is a hash of its
child nodes.
The benefit of using the Merkle Tree in blockchain is that instead of downloading
every transaction and every block, a “light client” can only download the chain of
block headers.
Blockchain Certification Training
Instructor-led Sessions
Real-life Case Studies
Assignments
Lifetime Access
Explore Curriculum
The first and in fact the prime difference is Blockchain is a digital ledger that can be
decentralized very easily. The chances of error in this approach are far less than that
in an ordinary ledger. An ordinary ledger is what that is prepared by hands or by
human efforts while the Blockchain performs all its tasks automatically. You just
need to configure it in a proper manner and by following all the guidelines.
The common types of records (to name a few) that can be kept on the
Blockchains are:
The system relies on the network servicing protocol and the nodes of the network.
After the development of bitcoin, various blockchain platforms started coming up.
Ethereum came right after the evolution of Bitcoins, and is one of the popular public
platforms for building Blockchain based applications.
It’s a condition when one digital token is spent multiple times because the token
generally consists of a digital file that can easily be cloned. It simply leads to inflation
and organizations must bear a huge loss. One of the primary aims of Blockchain
technology is to eliminate this approach up to the possible extent.
Bitcoin [Ans]
Ethereum
Q 3. Bitcoin is based on ________ blockchain?
Private
Public [Ans]
Public Permissioned
Permissioned
Q 4. Blockchain can be stored as which of the following?
A flat file
A Database
Both of the above [Ans]
None of the above
Scalability
Improved Security
Tamper Proof
Increased Efficiency [Ans]
Q 7. Hash identifying each block in the Blockchain is generated using which of
the following cryptographic algorithm?
SHA128
SHA256 [Ans]
Q 8. A block in the blockchain can never have more than one parent
block?
True [Ans]
False
Q 9. Blockchain forks can result in which of the following?
Blowfish
Twofish
RSA [Ans]
Tripple DEA
Advanced Blockchain Interview Questions
Q 1. Can you tell me some of the widely used cryptographic
algorithms?
Q 2. Tell me more about RSA algorithm? How secure is this
algorithm?
Security of R.S.A.
Blind signatures are typically employed in privacy-related protocols where the signer
and message author are different parties. Examples include cryptographic election
systems and digital cash schemes.
It is a well-known fact that security matters a lot in digital transactions. Secret sharing
is an approach meant for same. In Blockchain technology it is an approach that
divides secret or personal information into different units and sent them to the users
on the network.
The original information can only be combined when a participant to whom a share
of the secret is allocated agree to combine them together with others. There are
several security-related benefits it can offer in Blockchain technology.
Q 7. What are the threats to the information you are familiar with?
There are lots of threats to information in the present scenario. Due to increase in
online transactions over the internet, many hackers have become active and are
adopting new approaches to hack information and servers that contain financial
information.
The major threat is software attack, identity theft, information extortion, as well as
sabotage. In addition to this, Trojan horses, worms, and viruses are other trouble
creators.
It is basically a process of finding the threats and all the vulnerabilities to the financial
records of an organization. The best thing that can be done with this approach is to
take the right countermeasures against them immediately.
51% Attack refers to a situation where a group of miners who hold more than 50% of
the Network Hash Rate could manipulate with the New transactions (Stopping the
transactions to proceed or gaining conformations) or able to reverse the transactions
that were recently confirmed and kind of doing Double spend. It is Highly unlikely to
be able to do that today but it is possible.
There is no strict upper limit on the category of business who can consider this
approach. The fact is almost all the businesses are engaged in online or financial
transactions that they need to make to run the processes smoothly. Large-scale
corporations, financial institutions, private businesses, government departments and
even defense organizations can trust this technology very easily.
Q 14. What are the key principles in Blockchain that are helpful in eliminating
the security threats that needs to be followed?
Yes, there are a few principles that need to be followed with respect to time. They
are:
1.Auditing
2.Securing applications
3. Securing testing and similar approaches
4. Database security
5. Continuity planning
6. Digital workforce training
All these principles are basic and are easy to implement. They are helpful in making
the transactions records useful.
Banks and accounting systems use ledgers to track and timestamp transactions. The
difference is that the blockchain is completely decentralized and an open source.
This means that people do not have to rely on or trust the central bank to keep track
of the transactions. The peer-to-peer blockchain technology can keep track of all the
transactions without the fear of having them erased or lost.
Blockchain Certification Training
Q 17. Can you list some of the popular consensus algorithms? Why we need
different consensus mechanisms?
Now, the possible reasons why we need consensus mechanism more than “proof-of-
work” are”
There is no specific condition of using it. However, the network must be a peer-to-
peer network under the concerned protocols. It validates the new block simply and
helps organizations to keep up the pace in this matter without investing in third-party
applications.
Q 19. Name the steps that are involved in the Blockchain project
implementation?
Well, there are total six steps involved in this process and they are:
1. Requirement identification
2. Screen ideas consideration
3. Project development for Blockchain
4. Feasible study on the security
5. Implementation
6. Controlling and monitoring the project
Limited Transparency
The centralized hub can be removed and the blockchain can be used to directly
transfer share ownership between investors.
Explanation: The first blockchain was conceptualized by a person (or group of people)
known as Satoshi Nakamoto in 2008.
8. Which of the following statement is true about blockchain?
A. A blockchain is a decentralized, distributed, and oftentimes public, digital
ledger consisting of records called blocks
B. A blockchain database is managed autonomously using a peer-to-
peer network and a distributed timestamping server
C. A blockchain has been described as a value-exchange protocol.
D. All of the above
View Answer
Ans : D
Explanation: Blocks hold batches of valid transactions that are hashed and encoded into
a Merkle tree.
Explanation: True, The block time is the average time it takes for the network to
generate one extra block in the blockchain.
Bitcoin MCQ Questions And
Answers
This section focuses on "Bitcoin" in Blockchain. These Multiple Choice
Questions (MCQ) should be practiced to improve the Blockchain skills
required for various interviews (campus interviews, walk-in interviews,
company interviews), placements, entrance exams and other competitive
examinations.
1. The Bitcoin was introduced in this world by?
A. Stuart Haber
B. W. Scott Stornetta
C. Satoshi Nakamoto
D. Dave Bayer
View Answer
Ans : C
Explanation: The Bitcoin was introduced in this world by Satoshi Nakamoto through a
research-style white paper entitled Bitcoin
Explanation: public keys, which may be disseminated widely, and private keys, which
are known only to the owner.
Explanation: The PKI accomplies two functions : authentication and the message privacy
through encryption/decryption mechanism
Explanation: PKI stands for public key infrastructure in which one or more third parties –
known as certificate authorities - certify ownership of key pairs.
Explanation: Triple-DES uses 168 bit key size and IDEA and CAST uses 128 bits key
length.
9. Private key algorithm is used for _____ encryption and public key
algorithm is used for _____ encryption.
A. Messages, session key
B. Session key, messages
C. Can be used for both
D. None of the above
View Answer
Ans : A
Explanation: Private key algorithm is used for encryption of messages and public key
algorithm is used for encryption of session keys.
10. In public key cryptosystem which is kept as public?
A. Decryption keys
B. Encryption keys
C. Encryption & Decryption keys
D. None of the above
View Answer
Ans : B
Explanation: In public key cryptosystem, the encryption keys are kept as public where as
decryption keys are kept as secret.
Hashing MCQ Questions And
Answers
This section focuses on "Hashing" in Blockchain. These Multiple Choice
Questions (MCQ) should be practiced to improve the Blockchain skills
required for various interviews (campus interviews, walk-in interviews,
company interviews), placements, entrance exams and other competitive
examinations.
1. A hash function takes an input string with?
A. numbers
B. alphabets
C. media files
D. All of the above
View Answer
Ans : D
Explanation: A hash function takes an input string (numbers, alphabets, media files) of
any length and transforms it into a fixed length.
Explanation: Hash codes can be decomposed into independent subcodes and this was
the logic behind the meet in the middle attack.
Explanation: The leaf nodes are the lowest node in the tree.
Explanation: Merkle trees are created by repeatedly calculating hashing pairs of nodes
until there is only one hash left. This hash is called the Merkle Root, or the Root Hash.
Explanation: A Merkle tree stores all the transactions in a block by producing a digital
fingerprint of the entire set of transactions. It allows the user to verify whether a
transaction can be included in a block or not.
Explanation: Merkle trees are in a binary tree, so it requires an even number of leaf
nodes.
Explanation: Merkle Root is stored in the block header. The block header is the part of
the bitcoin block which gets hash in the process of mining.