Questions for the CBSP were updated on : Nov 21 ,2025
Which types of network attacks focus on partitioning the blockchain network? Select all that apply
A, B, C
Which of the following is NOT a common regulatory requirement tor businesses?
A
Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to
be considered untrusted due to random chance.
A
Which of the following blockchains uses a channel-focused architectural design?
B
The goal of most network-based blockchain attacks is to enable what type of attack?
A
Properly encrypted data stored in the distributed ledger adequately protects data in both the short-
term and the long-term
A
Multisignatures are designed to allow a set of users to make a valid transaction only if a set minimum
number of them consent
A
A network design where some nodes are prohibited from communicating directly with other nodes
does not compromise the security of the blockchain.
A
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in
consensus?
A
Which smart contract auditing strategy identities which variables in the function can be affected by
the person running it?
B
Using public keys tor identity management helps blockchain technology achieve which of the
following?
B
Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.
A
The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its
vulnerability to traditional Denial of Service attacks
B
Which of the following blockchains best implements need-to-know tor blockchain data?
C
Compromising blockchain accounts is beneficial to which of the following types ot attacks?
D