Blockchain Foundations – Comprehensive Assessment

This quiz covers Modules 1–5: Cryptography, Hashing, Merkle Trees, Digital Signatures, Consensus, and Blockchain Data Structures. There are 20 questions in total.

Instructions: Select the best answer for each multiple-choice question. Short-answer questions should be answered concisely.

Module 1 – Cryptographic Foundations

Q1. What is the core purpose of a cryptographic hash function?

  1. To encrypt user data securely.
  2. To produce a fixed-length digest representing arbitrary input.
  3. To speed up network communication.
  4. To store private keys safely.

Select one:

A
B
C
D

Q2. The avalanche effect means that:

  1. Hashes become easier to reverse over time.
  2. A small input change results in a drastically different hash.
  3. Private keys cannot be stored securely.
  4. Data is encrypted by default.

Select one:

A
B
C
D

Q3. Which of the following properties makes hashes essential for blockchain?

  1. They allow nodes to communicate without latency.
  2. They enable tamper detection through hash chaining.
  3. They create private keys.
  4. They reduce energy expenditure.

Select one:

A
B
C
D

Q4. (Short answer) Describe why one-wayness (preimage resistance) is crucial for blockchain security.


Module 2 – Hashing, Hash Pointers, and Merkle Trees

Q5. What does a hash pointer store?

  1. A pointer to memory only.
  2. A hash of the entire blockchain.
  3. A pointer + the hash of the data being pointed to.
  4. A private key for verification.

Select one:

A
B
C
D

Q6. The Merkle root in a block represents:

  1. The hash of the previous block.
  2. The hash of the miner’s private key.
  3. A commitment to all transactions in the block.
  4. A random nonce used for difficulty adjustment.

Select one:

A
B
C
D

Q7. What is a key benefit of Merkle proofs?

  1. They allow verification using only a small subset of hashes.
  2. They eliminate mining completely.
  3. They allow centralised validation.
  4. They replace cryptographic signatures.

Select one:

A
B
C
D

Q8. (Short answer) Explain why Merkle trees allow blockchains to scale light clients efficiently.


Module 3 – Public-Key Cryptography, Signatures, and Identity

Q9. A private key must remain secret because:

  1. It increases mining efficiency.
  2. It is required to generate block headers.
  3. It grants full control over a blockchain identity.
  4. It cannot be backed up.

Select one:

A
B
C
D

Q10. Digital signatures provide:

  1. Confidentiality only.
  2. Authentication and integrity.
  3. Mining difficulty adjustment.
  4. Network compression.

Select one:

A
B
C
D

Q11. Blockchain identity is fundamentally based on:

  1. Domain registration.
  2. Centralised databases.
  3. Control of a private key.
  4. Government-issued certificates.

Select one:

A
B
C
D

Q12. (Short answer) Explain why losing the private key means losing access to all associated blockchain assets permanently.


Module 4 – Distributed Consensus

Q13. The Byzantine Generals Problem illustrates:

  1. How to compress blockchain data.
  2. The difficulty of achieving agreement in the presence of malicious actors.
  3. How to generate private keys.
  4. Why networks must use central servers.

Select one:

A
B
C
D

Q14. The central idea behind Nakamoto Consensus is that:

  1. The longest valid chain represents the canonical blockchain.
  2. Nodes vote manually on each block.
  3. All nodes must be known beforehand.
  4. Consensus is achieved instantly.
A
B
C
D

Q15. In Proof of Work, the mining puzzle is designed to be:

  1. Easy to compute and easy to verify.
  2. Hard to compute and hard to verify.
  3. Hard to compute but easy to verify.
  4. Easy to compute but impossible to verify.
A
B
C
D

Q16. (Short answer) Why is finality in Nakamoto Consensus considered probabilistic rather than absolute?


Module 5 – Blockchain Data Structures and Nodes

Q17. Which of the following is included in a block header?

  1. The miner’s private key.
  2. Pending mempool transactions.
  3. The parent hash and Merkle root.
  4. The full world state.
A
B
C
D

Q18. A full node is best described as a node that:

  1. Stores only block headers.
  2. Stores and verifies the entire blockchain history.
  3. Mines blocks without verification.
  4. Only forwards gossip messages.
A
B
C
D

Q19. Mempool transactions are:

  1. Expired data discarded by the network.
  2. Unsigned messages awaiting hashing.
  3. Pending transactions waiting to be included in a block.
  4. Mining difficulty records.
A
B
C
D

Q20. (Short answer) Explain why light clients do not need the full blockchain to validate transactions.


This is a static WordPress-compatible quiz. To enable auto-grading, add JS via a plugin or import these questions into a quiz tool.

<!–

Answer Key (Lecturer Use Only)

  1. B
  2. B
  3. B
  4. (Short answer)
  5. C
  6. C
  7. A
  8. (Short answer)
  9. C
  10. B
  11. C
  12. (Short answer)
  13. B
  14. A
  15. C
  16. (Short answer)
  17. C
  18. B
  19. C
  20. (Short answer)
–>

Pages: 1 2 3 4 5 6