Blockchain Flashcards

1
Q

What’s the difference between centralized and decentralized systems?

A
  • Centralized systems have single PoF, lacks scalability and have higher costs.
  • Decentralized systems do not have single PoF, have better scalability and reduced costs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is a decentralized ledger better?

A

No designated centralized authority gets to decide on anything, consensus is determined by a large amount of people instead as we distribute trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a bolckchain?

A

Chain of blocks (linked list) that contain information on validated transactions that prevents unauthorized data changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is proof of work?

A

Proof of work is a computational problem that takes considerable effort to solve, but time to verify is way less.

If an attacker tampers with a block and broadcasts it, they will also require a lot of effort to recalculate all PoW for following blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the PoW consensus model?

A

PoW is a consensus algorithm used to confirm transactions and generate new blocks to be added to a chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are merkle trees?

A

Merkle trees are used to efficiently store large data structures, such as blockchain transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages of merkle tree?

A
  • Easy to check
  • Use less resources
  • Easy to verify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some blockchain vulnerabilities?

A
  • 51% attack
  • Double Spend attack
  • DDoS attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you mitigate a 51% attack?

A

Penalize privately mined blocks with a block acceptance delay in relation to the amount of time the block has been hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you mitigate a double spend attack?

A

Use a shard / layer2 chain like Komodo that provides an anchor to which a blockchain can reference the last legal block in case of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you mitigate a DDoS attack?

A
  • Rent decentralized data
  • Use protection pools filled with unused bandwidth
  • Block specific IPv4/v6 addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly