Which of the following features were exploited as part of the Verge cryptocurrency hack? Select all that apply.
A network design where some nodes are prohibited from communicating directly with other nodes does not compromise the security of the blockchain.
Which of the following attacks only requires a single account and performs only normal blockchain operations?
Which blockchain security control either risks centralization or permanently divergent chains?
Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply
The public visibility of blockchain data increases the risks associated with the compromise of encryption algorithms
Quantum computers threaten traditional cryptography because they provide polynomial solutions to mathematically "hard" problems
Which of the following blockchain consensus algorithms is the most sustainable long-term?