Questions for the HFCP were updated on : Nov 21 ,2025
What is the advantage of using state-based endorsement policy over a chaincode or collection level
endorsement policy?
C
Explanation:
State-based endorsement policies in Hyperledger Fabric offer a significant advantage by allowing
endorsement policies to be specified at the level of individual state keys within the ledger. This
granularity means that the endorsement policy for specific assets or data points can be tailored
independently of others and can be updated without the need to redeploy or update the chaincode
itself. This flexibility supports dynamic business needs and complex governance structures where
different assets may require different endorsement levels based on their sensitivity or value .
In Hyperledger Fabric, what data structures manage sensitive information between organizations?
A
Explanation:
In Hyperledger Fabric, "private data collections" are used to manage sensitive information between
organizations. This feature allows specified subsets of data to be shared among a defined group of
network participants while keeping it hidden from others, thus maintaining confidentiality and
privacy across the network. Private data collections enable organizations to transact privately
without having to establish a separate channel, significantly reducing the overhead associated with
channel management .
For an endorsed transaction, the gateway service forwards the transaction to the ordering service,
which orders it with other endorsed transactions and then completes what?
B
Explanation:
For an endorsed transaction, the gateway service forwards the transaction to the ordering service.
The ordering service then packages this transaction with other endorsed transactions into a block.
This block is subsequently distributed across the network to all peers for validation and commitment
to the ledger. The ordering process ensures the maintenance of transaction order across the
network, crucial for the consistency and integrity of the blockchain .
When using "off-line signing" in the Fabric Gateway client API, what information from each message
is used to generate the cryptographic signature?
A
Explanation:
When using "off-line signing" in the Fabric Gateway client API, the cryptographic signature is
generated using the message digest. This digest is a hashed representation of the transaction's
content, ensuring the integrity and non-repudiation of the transaction as it moves through the Fabric
network. This method allows for secure transaction signing without exposing private keys directly on
the client-side, aligning with security best practices .
What is the main purpose of certificates in Hyperledger Fabric?
B
Explanation:
In Hyperledger Fabric, certificates primarily provide identity for various actors within the network,
such as peers, orderers, and clients. These certificates facilitate not just node-to-node
communication and data integrity but also contribute significantly to the security measures of the
network, such as authentication and authorization processes. Importantly, these certificates are
utilized in TLS (Transport Layer Security) protocols to secure communications between nodes on the
network. Fabric utilizes X.509 certificates for these purposes, which are issued by a Certificate
Authority (CA) within the network .
What is a range query with a start and end key?
A
Explanation:
In Hyperledger Fabric, a range query with a start and end key is a type of query that searches for all
ledger entries whose keys fall within the specified range defined by the startKey and endKey. This is
used, for example, to retrieve a subset of assets from the ledger based on their key values,
effectively iterating over a specified range .
Which are the transaction steps that are managed by the Fabric gateway service?
C
Explanation:
The transaction steps managed by the Fabric gateway service in Hyperledger Fabric are to evaluate,
endorse, submit, and obtain the commit status of transactions. This service simplifies the process for
clients by handling these critical transaction steps, which facilitates more efficient transaction
processing and management within the network .
What are the standard possibilities to configure parameters of a component (peer, orderer) in
Hyperledger Fabric?
C
Explanation:
In Hyperledger Fabric, the standard possibilities to configure parameters of a component, such as a
peer or orderer, include using YAML configuration files, environment variables, and command-line
interface (CLI) flags. This approach provides flexibility and allows for detailed control over the
parameters that govern the behavior of these components .
Which is the last step in the Hyperledger Fabric transaction flow?
B
Explanation:
The last step in the Hyperledger Fabric transaction flow is the commitment of the transaction to the
ledger and the subsequent notification to the client application1
. Once the transaction has been
endorsed and ordered, it is committed to the ledger on all peers. After the transaction is committed,
the peers asynchronously notify the client application of the success or failure of the transaction.
This
ensures that the client application is aware of the outcome and can take appropriate actions based
on the result of the transaction1
Where would you generate a unique ID to represent an asset on the ledger?
B
Explanation:
In Hyperledger Fabric, a unique ID to represent an asset on the ledger is typically generated in the
client application before the transaction is submitted to the blockchain. This approach ensures that
each asset has a unique identifier, which is crucial for tracking and managing assets throughout their
lifecycle on the ledger.
In Hyperledger Fabric, CouchDB is enabled as the state database by changing the state Database
configuration option from goleveldb to what?
D
Explanation:
In Hyperledger Fabric, to enable CouchDB as the state database, the stateDatabase configuration
option in the core.yaml file must be changed from goleveldb to CouchDB. This change directs the
peer to use CouchDB instead of the default LevelDB for storing the world state, which can then be
queried using rich queries and provides additional features like indexing.
What allows users to update channels, or invoke new Smart Contracts?
C
Explanation:
In Hyperledger Fabric, the peer CLI (Command Line Interface) tool is used to update channels or
invoke new smart contracts. This utility allows users to perform various administrative tasks on the
network, such as updating the ledger, changing endorsement policies, and managing chaincode
installations and instantiations .
What happens if the user submits a transaction with no matching function?
D
Explanation:
In Hyperledger Fabric, if a user submits a transaction with no matching function specified in the
smart contract, the unknownTransaction function is invoked by default. This function serves as a
catch-all method that can be used to handle cases where the transaction type is not recognized,
providing a mechanism to manage or log these occurrences effectively .
In Raft, there are two places for configuration. One is local configuration. What is the other?
B
Explanation:
In Raft, configuration occurs at two levels: local and channel. The local configuration pertains to
node-specific settings such as TLS communication and file storage. The channel configuration, on the
other hand, defines the membership and operational parameters of the Raft cluster for a specific
channel, including settings like heartbeat frequency and leader timeouts. This dual-level
configuration allows for precise control over the behavior of Raft nodes within the Hyperledger
Fabric network .
What is the only way to recover from a failed migration from Kafka to Raft?
B
Explanation:
Recovering from a failed migration from Kafka to Raft in Hyperledger Fabric involves restoring the
state from a backup. This is necessary because once the ordering service is migrated to Raft and
begins committing transactions, reverting to Kafka is not supported without a previous backup. If a
migration is botched, and a backup was made at the appropriate point, administrators can roll back
to this backup to restore the system to its pre-migration state .