New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CBDH Questions and Answers

Question # 6

Which Hyperledger Fabric ordering mechanism is recommended for production use?

A.

BFT

B.

Kafka

C.

SBFT

D.

SOLO

Full Access
Question # 7

When designing a client application it is important to note that queries are defined in a query file (.qry).

Where is this .qry file stored?

A.

Parent directory of the business network definition

B.

/tmp directory of the package.json file

C.

Child directory of the package.json file

D.

Child directory of the business network definition

E.

Parent directory of the package.json file

Full Access
Question # 8

What is the best description of how Kafka is utilized for consensus approach in Hyperledger Fabric?

A.

Kafka does not support crash tolerance but it does not offer protection against rogue nodes in the network.

B.

Provides Byzantine fault tolerance. Finality happens in a matter of seconds. Scale to petabytes of data, distributed across many clusters.

C.

Provides Byzantine fault tolerance. Finality happens in a matter of seconds.

D.

Permissioned voting based Leader does ordering. Only in-sync replicas can be voted as leader.

Full Access
Question # 9

What is the best definition of chaincode with Hyperledger?

A.

Chaincode is a decentralized transactional program, running one the validating nodes.

B.

Chaincode is centralized transactional program, running on the validating nodes.

C.

Chaincode is centralized transactional program, running on the peer nodes.

D.

Chaincode is a decentralized transactional program, running on the peer nodes.

Full Access
Question # 10

The security module works in conjunction with the ________________________ module to provide access control service to any data recorded and business logic deployed on a chain network. 

A.

HSM

B.

Membership Services

C.

Chaincode

D.

Consensus

Full Access
Question # 11

You are starting to understand the needed package dependencies for chaincode. What are the two required packages? (Select two.)

A.

Init

B.

Peer Protobuf

C.

Shim

D.

Start

Full Access
Question # 12

What type of node commits transactions & keeps the data in sync across the ledger?

A.

Committed

B.

Endorsed

C.

Client

D.

Peer

Full Access
Question # 13

What component on the blockchain maintains the "world state"?

A.

Consensus Algorithm

B.

Reputation Manager

C.

Consensus Manager

D.

Distributed Ledger

Full Access
Question # 14

In Hyperledger Composer resources are declared which three ways? (Choose three.)

A.

Assets, orderers, transactions, and events

B.

Concepts

C.

Assets, participants, transactions, end events

D.

Collections

E.

Non Enumerated types

F.

Enumerated types

Full Access
Question # 15

Hyperledger Fabric essentially implements a private validator network protocol.

Which of the following statements are true?

A.

None of the entities in a network must register with membership services to obtain with access and transaction authority on the network.

B.

Selected entities in a network must register with membership services to obtain an identity with access and transaction authority on the network.

C.

All the entities in a network must register with membership services to obtain an identity with access and transaction authority in the network.

D.

Selected entities in a network must register with Reputation Manager to obtain an identity with access and transaction authority on the network.

Full Access
Question # 16

Voting-based algorithms are advantageous in that they provide a benefit but a tradeoff. (Select two.)

A.

Trade off between scalability and security.

B.

Better security due to node control.

C.

Low-latency finality.

D.

Trade off between scalability and performance.

Full Access
Question # 17

Smart contracts are created by computer programmers through the help of smart contract development tools and are entirely digital. These programs are usually written using programming code languages.

Which of the following languages would not be ideal for use in smart contracts?

A.

Python

B.

Assembler

C.

C++

D.

Go

E.

Java

Full Access
Question # 18

Exhibit.

Based on the code snippet, the unique identifier for the Delivery is:

A.

status

B.

trackingld

C.

gpsReadings

D.

contract

Full Access
Question # 19

REST (Representational State Transfer) Server is often used to proxy requests to Hyperledger chaincode.

What value does using REST APIS provide?

A.

Provides a well-defined process for accessing blockchain services.

B.

Provides a well-defined middleware for connecting to off chain services such as Bitcoin.

C.

Provides a well-defined middleware for connecting to blockchain services.

D.

Provides a well-defined process for accessing web services.

Full Access
Question # 20

Chaincode interface must be implemented by ever chaincode program.

A.

TRUE

B.

FALSE

Full Access
Question # 21

Which of the following is the best answer when reviewing a "Code Invoking Transaction" in Hyperledger Fabric?

A.

Code invoking transaction is an SOAP API call to a chaincode function and is similar to how a URL pattern invokes a servlet in J2EE.

B.

Code invoking transaction is an REST API call to a chaincode function and is similar to how a URL pattern invokes a servlet in Node.js

C.

Code invoking transaction is an API call to a chaincode function and is similar to how a URL pattern invokes a servlet in Node.js

D.

Code invoking transaction is an REST API call to a chaincode function and is similar to how a URL pattern invokes a servlet in J2EE.

E.

Code invoking transaction is an API call to a chaincode function and is similar to how a URL pattern invokes a servlet in HTTPS

F.

Code invoking transaction is an RPC API call to a chaincode function and is similar to how a URL pattern invokes a servlet in HTTPS.

Full Access
Question # 22

Which Hyperledger Tool brings on demand as-a-service deployment model into the blockchain ecosystem in order to reduce the effort required to create, manage, and terminate blockchains?   

A.

Composer

B.

Cello

C.

Caliper

D.

Quilt

E.

Explorer

Full Access
Question # 23

In Hyperledger Fabric channels are used to ensure privacy and confidentiality. Which of the following is not correct about channels?

A.

Peers are connected to the channel and can receive all the transactions that are broadcasted on that channel

B.

Each channel maintains their own chaincode and ledger

C.

Channels are membership based.

D.

Consensus takes place within a channel by members of the channel and other channels.

E.

Channels partition the network in order to allow transaction visibility for specific stakeholders only

Full Access
Question # 24

Exhibit.

Based on the code snippet displayed, if fn Is nil - what are the possibilities

A.

An error is generated

B.

Shira.Error(err.ErrorO) is returned

C.

get is assumed and processed

D.

None of the above

Full Access
Question # 25

The CA (Certificate Authority) in Hyperledger Fabric issues the certificates. These certificates are used for identity validation and for transmission of encrypted data that only the owner (person, organization or software) of a specific certificate is able to decrypt and read.

What types of certificates are issued by the CA?

A.

tcert

B.

ecert

C.

rootcert

Full Access
Question # 26

A business wants only certain parties using the DLT to have visibility/access to their data. This refers to the______challenge

A.

Standardization

B.

Interoperability

C.

Privacy

D.

Confidentiality

Full Access
Question # 27

The gossip data dissemination protocol performs which three functions? (Choose three.)

A.

Manages peer discovery and channel membership

B.

Disseminates ledger data across all peers on the channel

C.

Manages channel membership only

D.

Sync ledger state across all peers on any channel

E.

Sync ledger state across all peers on the channel

F.

Manages peer discovery only

Full Access
Question # 28

Exhibit.

The function displayed is not called:

A.

On delete

B.

On initialization

C.

On upgrade

Full Access
Question # 29

Hyperledger Fabric allows multiple certification authorities to be setup for a business network application.

E.g., it there are 3 members using the network application, all 3 members can issue certificates to their employees so they can initiate transactions on the network

application.

A.

TRUE

B.

FALSE

Full Access