Blockchain and its Applications | Week 11
Table of Contents

Blockchain and its Applications Assignment 11 Answers (JAN-APR 2025)
Course Link: Click Here
1. What is Hyperledger Aries primarily used for?
a) Facilitating decentralized identity management
b) Managing cryptocurrency transactions
c) Building supply chain solutions
d) Developing blockchain consensus algorithms
2. Which of the following is/are key job(s) that Hyperledger Aries mainly perform(s)?
a) Proof-of-Stake consensus
b) Aries can work as IIN (Interoperable Identity Network) agent
c) Verifiable credentials exchange
d) Cryptographic currency generation
3. Which of the following does NOT pose a direct risk to the security and reliability of blockchain operations?
a) Vulnerability to 51% attacks
b) Compromise of private key security
c) Exploitation of double-spending vulnerabilities
d) High transaction fees
4. In what ways can high computing power/stake be misused in blockchain systems?
a) Taking control of consensus to manipulate transactions and enable double-spending
b) Temporarily accelerating block generation to disproportionately increase mining rewards
c) Compromising transaction privacy by analyzing cryptographic hashes
d) Manipulating the blockchain to censor or exclude competitors’ transactions
Blockchain and its Applications Assignment 11 Answers
5. What is the main objective of a Selfish Mining Attack in a blockchain network?
a) To increase the transaction fees by monopolizing block creation.
b) To disrupt the blockchain’s consensus by manipulating the chain’s length to gain mining rewards unfairly.
c) To control over 50% of the network’s hashing power and reverse transactions.
d) To expose private transactions by decrypting the block headers.
6. A blockchain network has a 10-minute block interval. A miner, “Miner X,” controls 40% of the network’s hashing power. Miner X mines a block and does not broadcast it immediately. Instead, Miner X continues mining a second block in secret. What is the most likely result of Miner X’s actions in this scenario?
a) Miner X’s second block will automatically become part of the blockchain, and the first block will always be discarded.
b) Miner X’s second block will possibly create a fork in the blockchain, which will later be resolved through a chain reorganization.
c) Miner X will always successfully steal the rewards of other miners on the network.
d) Miner X’s actions must cause the network to collapse due to an attack.
7. Which of the following plays the most crucial role in establishing trust in a blockchain network?
a) Encryption
b) Consensus Mechanism
c) Smart Contracts
d) Distributed Ledger
8. Which of the following is/are primarily responsible for validating transactions in the Ethereum 2.0 blockchain (Proof of Stake)?
a) Miner
b) Validator
c) Peer-to-peer network
d) Core consensus protocol
9. Which of the following is a potential consequence of an Eclipse Attack on a blockchain node?
a) The targeted node may mine blocks more efficiently due to controlled connections.
b) The targeted node may accept fraudulent transactions or blocks, leading to potential double-spending.
c) The targeted node will immediately disconnect from the blockchain network to prevent further damage.
d) The targeted node will become immune to any form of attack after the Eclipse Attack.
10. Which of the following is a common technique used by attackers in a front-running attack on decentralized exchanges (DEXs)?
a) Manipulating the gas price to prioritize their transaction over others.
b) Encrypting transactions to hide them from miners.
c) Using a 51% attack to gain control over the network.
d) Altering the smart contract code to change transaction outcomes.
These are Blockchain and its Applications Assignment 11 Answers
More Solutions of Blockchain and its Applications: Click Here
More Nptel Answers: Click here


