What do you call the attack when malicious miners control more than 50% of the network?
Proof-of-Attack
Hash Attack
Mining Attack
51% Attack
Which describes the blockchain's security against manipulations and tamperings?
Immutable
Verifiable
Inconsistent
Consistent
What is responsible for stringing and securing all the blocks of data in the network together?
Bitcoin security program
Hashing
Satoshi technology
Ethereum
What does ‘nonce’ mean?
Non-centralized
Not once
None cells
Number used once
Which of the following are the criteria miners need to meet to successfully hash a block of transactions?
Nonce
Target number
SHA 256
SHA 222
The hash must be _______ the target number
greater than
less than
equal to
unrelated to
What happens after a block of transactions has been validated?
It is recomputed ten times to verify
It is added on top of previous blocks—containing previous transactions—forming a chain
It is re-hashed and re-shuffled with everything else
It is deleted from the system
What is a benefit of the Proof-of-Work system that eradicates any biases or possible loopholes for manipulation?
Randomness
Tangible
Irreversible
Duplicable
Why are bad actors less incentivized to attack the Bitcoin network?
Real-world costs of Bitcoin mining
Learning curve
Laziness
Good intentions
A 51% attack can happen when ______
A person or group owns 36% of the Bitcoin mining network
A person or group owns more than 50% of the Bitcoin mining network
A person or group owns 5.1% of the Bitcoin mining network
A person or group destroys more than 50% of the Bitcoin mining network
https://bitskwela.com/quiz/proof-of-work
Proof-of-Work
Your Score
/
0
/
10
answered