SHA - 1 is the most commonly used SHA algorithm, and produces a ______ - byte hash value(size).
Question No 2
What type of attack would be considered a very large flaw in public blockchains such as Bitcoin’s
Blockchain where the majority of hashpower could possibly be controlled thru an attack?
What is the specific attack Bitcoin could be exposed to?
Question No 3
How many satoshis are in 1 bitcoin and how many wei in an Ether? (Select two.)
Question No 4
In the Proof of Stake(POS) algorithm the miners are really known as ___________?
Question No 5
A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that
requires________.
What is required?