blockchain CBSP Exam Questions

Questions for the CBSP were updated on : Nov 21 ,2025

Page 1 out of 7. Viewing questions 1-15 out of 91

Question 1

Which types of network attacks focus on partitioning the blockchain network? Select all that apply

  • A. Eclipse
  • B. Sybil
  • C. Denial of Service
  • D. Routing
Answer:

A, B, C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following is NOT a common regulatory requirement tor businesses?

  • A. Data transparency
  • B. Data encryption
  • C. Personal data protection
  • D. Data control
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Transaction validation on DAG-based DLTs is designed in a way that allows legitimate transactions to
be considered untrusted due to random chance.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 4

Which of the following blockchains uses a channel-focused architectural design?

  • A. Ethereum
  • B. Corda
  • C. Hyperledger
Answer:

B

User Votes:
A
50%
B
50%
C
50%
Discussions
vote your answer:
A
B
C
0 / 1000

Question 5

The goal of most network-based blockchain attacks is to enable what type of attack?

  • A. Selfish Mining Attack
  • B. Double-Spend Attack
  • C. 51% Attack
  • D. Long-Range Attack
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Properly encrypted data stored in the distributed ledger adequately protects data in both the short-
term and the long-term

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 7

Multisignatures are designed to allow a set of users to make a valid transaction only if a set minimum
number of them consent

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 8

A network design where some nodes are prohibited from communicating directly with other nodes
does not compromise the security of the blockchain.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 9

In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in
consensus?

  • A. Proof of Burn
  • B. Proof of Work
  • C. Proof of Stake
  • D. Proof of Activity
  • E. None of the above
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

Which smart contract auditing strategy identities which variables in the function can be affected by
the person running it?

  • A. Manual Code Analysis
  • B. Symbolic Execution
  • C. Taint Analysis
  • D. Control Flow Analysis
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Using public keys tor identity management helps blockchain technology achieve which of the
following?

  • A. Decentralization
  • B. Anonymity
  • C. Trustlessness
  • D. Immutability
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 13

The use of Membership Service Providers (MSPs) partially centralizes a Blockchain and increases its
vulnerability to traditional Denial of Service attacks

  • A. True
  • B. False
Answer:

B

User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 14

Which of the following blockchains best implements need-to-know tor blockchain data?

  • A. Ethereum
  • B. Corda
  • C. Hyperledger
Answer:

C

User Votes:
A
50%
B
50%
C
50%
Discussions
vote your answer:
A
B
C
0 / 1000

Question 15

Compromising blockchain accounts is beneficial to which of the following types ot attacks?

  • A. 51% Attack
  • B. Eclipse Attack
  • C. Routing Attack
  • D. Sybil Attack
  • E. All of the above
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2