CSC470 ALL Terms

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to the instructor, the best way to keep BTC for long term storage is ________. on paper in one or more safety deposit boxes in the Cloud to utilize strong data protection and encryption standards on an electronic backup device QUIZ 13.2

on paper in one or more safety deposit boxes

Printing key material to paper is called a ___________. QUIZ 5.3

paper wallet

In December of 2018, Electrum was subject to an ongoing successful ___________ attack. phishing DDOS public key theft ransomware QUIZ 13.6

phishing

The book sees clear parallels between the Bitcoin mining boom and the: California gold rush. dot-com bust. dot-com boom. 2008 housing crisis. QUIZ 6.1

California gold rush.

___________ is an overlay currency. Counterparty Litecoin Aeternity CyberCash QUIZ 11.1

Counterparty

What is the dominant payment method online today. Credit Cards Bitcoin Paypal Cash QUIZ 12.8

Credit Cards

Creating currency before it's initial launch is called _______. pre-mining mining pre-seeding forecasting QUIZ 12.6

pre-mining

When the odds of solving a puzzle are not contingent on prior work, this is called __________. QUIZ 10.4

progress‐free

A cryptographic trick used by bitcoin exchanges to reassure their customers that they retain control of a certain amount of funds is called ____________. QUIZ 5.4

proof of reserve

**Alice is purchasing an item from Bob. Alice wants to verify the item before releasing funds so she enters an escrow transaction. Alice and Bob agree to bring Judy is as the third party. Later, Alice never receives the item and Judy agrees that the money should be returned to Alice. To facilitate this Judy will need to: sign the transaction with Alice. sign the transaction with Bob. self sign the transaction. take the money herself and initiate a new transaction to return the money to Alice. QUIZ 4.9

sign the transaction with Alice.

Adding features to the bitcoin protocol that make validation stricter would require a _______ fork. soft hard lateral congruent QUIZ 4.5

soft

Calculating how "related" two addresses are is called ___________. QUIZ 8.7

taint analysis

SHA-256, the hash function used in Bitcoin was designed by: the US National Security Agency (NSA). the Federal Bureau of Investigation. the National Institute of Standards and Technology (NIST). the American National Standards Institute (ANSI). QUIZ 6.10

the US National Security Agency (NSA).

Mining with FPGAs was a short lived phenomenon mostly because: the cost per performance was only marginally improved over GPUs. GPUs continued to be the more efficient option. GPUs has better total device utilization. FPGAs were poor at being stacked and used together in an array. QUIZ 6.8

the cost per performance was only marginally improved over GPUs.

If the puzzle has a defined and set (x) amount of steps to find a solution, and x is a very large number, then: the fastest miner always win. the fastest miner would often win. the winning miner would be a roughly even distribution over fast and slow miners. the slowest miner would win. QUIZ 10.3

the fastest miner always win.

**A key limitation with the "Chaum-Fiat-Naor" scheme was: the in ability to make change. an insecure algorithm an unintuitive user interface related to network latency QUIZ 1.4

the in ability to make change.

Selfish mining is another name for _________. QUIZ 6.9

Temporary block-withholding attack

A distributed consensus protocol has the following properties if it is to be considered valid: Termination with all honest nodes in agreement with the value. The value is generated by an honest node. Requires at least a simply majority of honest nodes agree with the value. Any node can generate the value. SEE TEXT- PAGE 29 QUIZ 3.4

Termination with all honest nodes in agreement with the value. The value is generated by an honest node.

"Proof of useful work" is the attempt to balance the negative externalities of Bitcoin (and other cryptocurrencies). True False QUIZ 10.5

True

A data furnace is about as efficient as an traditional electric furnace. True False QUIZ 6.4

True

A transaction fee is defined to be the difference between the total value of the coins that go into a transaction minus the total value of coins that come out. True False QUIZ 5.6

True

Any device that connects to the Bitcoin network is a node. True False QUIZ 7.3

True

Anyone can mint their own zerocoins. True False QUIZ 8.3

True

As of the publication of the book, the difficulty of finding a valid block is about one in 268. True False QUIZ 6.7

True

Bitcoin miners validate every transaction. True False QUIZ 6.5

True

Block discarding attacks between pools can be profitable. True False QUIZ 10.1

True

Either all or none of a transaction's output must be consumed by another transaction. True False QUIZ 4.7

True

Escrow transactions require a third party. True False QUIZ 4.4

True

Green addresses are a real world guarantee, not a bitcoin enforced guarantee. term-19 True False QUIZ 4.3

True

Green addresses could cause a double spent transaction. True False QUIZ 4.6

True

If you had 200 BTC on 8/1/2017, when Bitcoin Cash (BTH) was created by hard fork from the official Bitcoin blockchain (BTC), then you also had 200 BTH. True False QUIZ 9.1

True

In BTC, while double spending is possible, after a certain amount of confirmations it will be purged from the block chain. True False QUIZ 3.3

True

Losing your private keys means losing the associated BTC. True False QUIZ 13.5

True

Most small group and individual miners join together in mining pools to mitigate risk. True False QUIZ 6.3

True

Publishing a hash in a newspaper is low-fi way of secure timestamping. QUIZ 11.7

True

Quantum Computing could be a threat to the Bitcoin blockchain as well as any encryption based technology. True False QUIZ 13.4

True

Storing your bitcoins is all about storing and managing you keys. True False QUIZ 5.7

True

The Bitcoin client no longer uses IRC bootstrapping True False QUIZ 7.2

True

With a bitcoin exchange, moving funds does notactually move the money. True False QUIZ 5.8

True

Zerocoin can be compatible with Bitcoin if a soft fork is utilized. True False QUIZ 8.2

True

What happens if a single entity obtains 51% or more of the mining capacity in BTC? (a paragraph should do it - although you not limited to just that) QUIZ 3.6

Your Answer: Suppose a single entity obtains 51% or more of the mining capacity in BTC. In that case, the attacker can not "steal coins from an existing address" "because stealing from an existing address is not possible unless you subvert the cryptography. If a "51 percent attacker creates an invalid block that contains an invalid transaction that represents stealing Bitcoins from an existing address that the attacker doesn't control and transferring them to his own address," "there will be a fork in the chain." If there were "actual signs of a 51 percent attack, what will probably happen is that the developers will notice this and react to it. They will update the Bitcoin software, and we might expect that the rules of the system, including the peer‐to‐peer network, might change in some form to make it more difficult for this attack to succeed." (Bitcoin and Cryptocurrency Technologies p.71-72)

A key part of Satoshi's solution to prevent double spending is: a timestamp server a trusted centralized authority governmental oversight mutual trust agreements between hosts QUIZ 1.2

a timestamp server

A _________, a risk when using BTC exchanges, is when many people show up to demand their money at the same time depleting the liquid assets of the exchange. bank run ponzi scheme denial of service attack Lagrange interpolation QUIZ 5.9

bank run

______: It is infeasible to find two pairs (msg, nonce) and (msg', nonce') such that msg ≠ msg' and H(nonce || msg) = = (nonce' || msg'). binding hiding collision resistance message digest QUIZ 2.4

binding

In economics, a ___________ good is one where all individual goods are equivalent and can be substituted for each other. fungible durable static tangible

fungible

Adding new features to the bitcoin protocol that were previously considered invalid would require a _______ fork. hard soft lateral congruent QUIZ 4.2

hard

The _____ asserts that that if we're given the output of the hash function y = H(x), there's no feasible way to figure out what the input, x, was. hiding property collision resistance property puzzle friendliness property Satoshi principal QUIZ 2.5

hiding property

If there is any error when a bitcoin script is running, that whole transaction will be ______. invalid retried again immediately postponed to the next block recovered QUIZ 4.8

invalid

In Satoshi's paper, nodes always consider the _______ chain to be the correct one. longest oldest newest shortest QUIZ 1.3

longest

Puzzles where the time it takes to access memory dominate the total computation time. memory-bound memory-hard memory-free memory-open QUIZ 10.6

memory-bound

Which is not one of the three crucial properties of Bitcoin mining puzzles. memory-hard adjustable difficulty fast verification progress freeness QUIZ 10.2

memory-hard

Using a shared intermediary between several users is called __________. QUIZ 8.4

mixing

Matching the following four altcoins to their description: Based on a set of community values such as tipping and generosity. QUIZ 12.9B

Dogecoin

Ross Ulbricht went by the pseudonym ________________. P.180 QUIZ 9.6

Dread Pirate Roberts

Prior to version 0.6.x of Bitcoin client, the initial process of a client finding other nodes on the network was called _______________. QUIZ 7.4

IRC (Internet Relay Chat)

Assuming that other nodes will not build on another node that has been deemed bad (or dishonest) is conceptually called _______. Implicit Consensus Explicit Consensus Inherited Consensus Hierarchal Consensus QUIZ 3.5

Implicit Consensus

If you generate numerous identities (public keys) for yourself and interact online using those different identities: It is essential to have a good source of randomness. Otherwise adversaries might be able to deduce your secret key and take control of your identities Adversaries may be able to link your identities because public keys generated on the same computer tend to look similar Adversaries will not be able to de-anonymize you by analyzing your activity patterns None of the above QUIZ 2.1

It is essential to have a good source of randomness. Otherwise adversaries might be able to deduce your secret key and take control of your identities

There is a formula called ________________ that allows you to reconstruct a polynomial of degree K - 1 from any K points on the polynomial's curve. QUIZ 5.10

Lagrange interpolation

Matching the following four altcoins to their description: Uses a memory hard puzzle. It's original goals included being ASIC resistant. QUIZ 12.9D

Litecoin

The cyberphunk cryptographers created a version of ecash entitled: BitCoin CyberCash Paypal MagicMoney QUIZ 1.5

MagicMoney

Matching the following four altcoins to their description: It's goal is to provide a decentralized version of DNS. QUIZ 12.9C

Namecoin

The preferred way to do Bitcoin time stamping is using: OP_RETURN sending money to the hash of the public key MULTISIG include the hash as a comment on any transaction QUIZ 11.4

OP_RETURN

"Alice and Bob use ScroogeCoin. Alice owns ten coins, each under a different address (public key) and each of value 3.0. She would like to transfer coins of value 5.0 to Bob. Recall that the PayCoins transaction consumes (and destroys) some coins, and creates new coins of the same total value. AliceÕs transfer will require, at a minimum: " "One PayCoins transaction, one new coin created, and one signature" "One PayCoins transaction, two new coins created, and two signatures " "Two PayCoins transactions, two new coins created, and four signatures " "Two PayCoins transactions, one new coin created, and two signatures " QUIZ 2.2

"One PayCoins transaction, two new coins created, and two signatures "

In the United States, mandatory reporting requirements for money transfers start at ___________ and up. 10,000 100,000 1,000 100 QUIZ 9.2

10,000

It has been proven, via statistical anomaly, that the ____________ was not entirely random. 1969 US Military Draft NBA draft Illinois Lottery BTC Blockchain QUIZ 11.6

1969 US Military Draft

Studies have shown that the percentage of "zombie bitcion" is around ____. 25% 20% 32% 15% QUIZ 13.7

25%

If Gladys, Rosa, Brandy, Pete and Mabelle agree to protect their offline storage requiring 3 of the 5 people to access the funds, this option is called __________. QUIZ 5.1

3-out-of-5 multi-signature

**What is the current block reward in bitcoins? Hint: the books answer is from 2015. 6.25 12.5 25 50 QUIZ 6.2

6.25

A valid BTC address (in text) is: Base-58 Base-48 Base-64 Base-128 QUIZ 5.2

Base-58

Matching the following four altcoins to their description: A Ponzi scheme QUIZ 12.9E

BitConnect

____________ is a piece of open-source software that is a focal point for the discussion and debate about Bitcoin's rules. QUIZ 9.4

Bitcoin Core

A proposed contribution that includes a substantial protocol change requires a __________________. QUIZ 9.3

Bitcoin Improvement Proposals

Matching the following four altcoins to their description Is programmable meaning that users can build new kinds of applications. QUIZ 12.9A

Etherium

A bad actor can indefinitely block another user's transaction through a denial of service attack. True False QUIZ 3.1

False

A credit based system requires boot strapping. True False QUIZ 1.1

False

A substantially sized mining operation could not attack and disrupt another altcoin. True False QUIZ 12.1

False

Assuming the underlying cryptography is solid, there are ways for Jim to steal other peoples bitcoins. TRUE FALSE QUIZ 3.2

False

Bitcoin and HashCash have a different proof of work. True False QUIZ 12.4

False

Bitcoin has yet to experience a situation where mining difficulty has decreased. True False QUIZ 6.6

False

Creating colored coins in Bitcoin would require a change (fork) in the blockchain. True False P.222 QUIZ 11.3

False

CyberCash did not have any problems due to Y2K bugs. True False QUIZ 12.3

False

In Bitcoin, lead developers have formal power that forces people to follow them. True False QUIZ 9.5

False

P2SH is part of the original bitcoin design. True False QUIZ 4.1

False

The Bitcoin blockchain could NOT be modified to a different encryption algorithm if the need arose. True False QUIZ 13.3

False

The Bitcoin blockchain is easy to port for other purposes (uses). True False QUIZ 14.2

False

The authors believe that dismantling the State is potentially viable through blockchain technology. True False QUIZ 14.1

False

The bitcoin scripting language utilizes looping functions. True False QUIZ 4.10

False

The blockchain can be used to show the accuracy of predictions. True False QUIZ 11.5

False

The initial node broadcast of a transaction cannot be used for deanonymization. True False QUIZ 8.1

False

The only real threat, at this time, to the SHA-256 (and SHA-512) algorithm is a block stream attack. True False PRIMAGE ATTACK QUIZ 13.1

False

The vanity address is created easily and quickly by simply entering an unused address that fits the criteria you wish to select. True False QUIZ 5.5

False

You can play chess on the unmodified Bitcoin blockchain. True False QUIZ 12.2

False

Zerocash can be compatible with Bitcoin if a soft fork is utilized. True False QUIZ 8.6

False

These kinds of nodes are expected to be on at least 6 hours a day but not all the time. Full Mining Super Light QUIZ 7.1

Full

______ and _____ nodes always contain the entire blockchain in Bitcoin. Full Super Light Mining QUIZ 7.5

Full Super

Cash based systems provide which two key benefits: Higher Anonymity Offline Transacitons Less Anonymity Payment Verification QUIZ 12.7

Higher Anonymity Offline Transacitons

The _______________ is the set of transactions that an adversary cannot distinguish from your transaction. QUIZ 8.8

anonymity set

For a hash function, to be secure, it requires (choose all that apply): collision resistance hiding puzzle friendliness 128 characters QUIZ 2.3

collision resistance hiding puzzle friendliness

The hard part of bootstrapping your new cryptocurrency is __________. consensus about value of coins consensus about rules consensus about history consensus about future QUIZ 12.5

consensus about value of coins

Anonymization and _________ are often at odds with each other. QUIZ 8.5

decentralization


Ensembles d'études connexes

MGMT 200 Final Exam Practice Questions

View Set

Study Module 7: Membrane Structure and Function

View Set

GL19 U7 (PowerPoint) CH01 Concepts Exam

View Set