L9: Bitcoins and Cryptocurrency Flashcards

1
Q

Cryptographic hash functions do not have a key

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A major drawback of cryptographic hash functions is that it is easy to find two messages that have the same hash value.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic hash functions are primarily used for message integrity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The security of cryptocurrency ledgers depends on the honesty of its miners.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most cryptocurrencies are designed to maintain production, to keep inflation in check

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Since cryptocurrencies are pseudo-anonymous it is okay that they are more susceptible to law envorcement seizure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Changing a block requires regenerating all successors and redoing the work they contain

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a _____ attack, the attacker creates a lot of fake identities and uses them to change voting outcomes or control a network.

A

Sybil attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A sybil attack is designed to attack reputation systems in a peer-to-peer network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sybil attacks can be stopped if users are willing to give up anonymity

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Bitcoin, attacks are infeasible if majority of miners weighted by hash power follow the protocol

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Bitcoin, an attacker who controls 51% of the computing power in the network can steal coins from existing addresses.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Bitcoin, an attacker who controls 51% of the computing power in the network can suppress some transactions from the block chain.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Bitcoin, an attacker who controls 51% of the computing power in the network can change the block reward.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hot storage wallets are _______.

A

Online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cold storage wallets are _______.

A

Offline

17
Q

A time-stamping service prevents people from double spending Bitcoins

A

True

18
Q

Each user has a single Bitcoin that is used in all transactions

A

False

19
Q

The expenditure of individual coins cannot be tracked

A

False