Blockchain Foundations – Comprehensive Assessment
This quiz covers Modules 1–5: Cryptography, Hashing, Merkle Trees, Digital Signatures, Consensus, and Blockchain Data Structures. There are 20 questions in total.
Instructions: Select the best answer for each multiple-choice question. Short-answer questions should be answered concisely.
Module 1 – Cryptographic Foundations
Q1. What is the core purpose of a cryptographic hash function?
- To encrypt user data securely.
- To produce a fixed-length digest representing arbitrary input.
- To speed up network communication.
- To store private keys safely.
Select one:
AB
C
D
Q2. The avalanche effect means that:
- Hashes become easier to reverse over time.
- A small input change results in a drastically different hash.
- Private keys cannot be stored securely.
- Data is encrypted by default.
Select one:
AB
C
D
Q3. Which of the following properties makes hashes essential for blockchain?
- They allow nodes to communicate without latency.
- They enable tamper detection through hash chaining.
- They create private keys.
- They reduce energy expenditure.
Select one:
AB
C
D
Q4. (Short answer) Describe why one-wayness (preimage resistance) is crucial for blockchain security.
Module 2 – Hashing, Hash Pointers, and Merkle Trees
Q5. What does a hash pointer store?
- A pointer to memory only.
- A hash of the entire blockchain.
- A pointer + the hash of the data being pointed to.
- A private key for verification.
Select one:
AB
C
D
Q6. The Merkle root in a block represents:
- The hash of the previous block.
- The hash of the miner’s private key.
- A commitment to all transactions in the block.
- A random nonce used for difficulty adjustment.
Select one:
AB
C
D
Q7. What is a key benefit of Merkle proofs?
- They allow verification using only a small subset of hashes.
- They eliminate mining completely.
- They allow centralised validation.
- They replace cryptographic signatures.
Select one:
AB
C
D
Q8. (Short answer) Explain why Merkle trees allow blockchains to scale light clients efficiently.
Module 3 – Public-Key Cryptography, Signatures, and Identity
Q9. A private key must remain secret because:
- It increases mining efficiency.
- It is required to generate block headers.
- It grants full control over a blockchain identity.
- It cannot be backed up.
Select one:
AB
C
D
Q10. Digital signatures provide:
- Confidentiality only.
- Authentication and integrity.
- Mining difficulty adjustment.
- Network compression.
Select one:
AB
C
D
Q11. Blockchain identity is fundamentally based on:
- Domain registration.
- Centralised databases.
- Control of a private key.
- Government-issued certificates.
Select one:
AB
C
D
Q12. (Short answer) Explain why losing the private key means losing access to all associated blockchain assets permanently.
Module 4 – Distributed Consensus
Q13. The Byzantine Generals Problem illustrates:
- How to compress blockchain data.
- The difficulty of achieving agreement in the presence of malicious actors.
- How to generate private keys.
- Why networks must use central servers.
Select one:
AB
C
D
Q14. The central idea behind Nakamoto Consensus is that:
- The longest valid chain represents the canonical blockchain.
- Nodes vote manually on each block.
- All nodes must be known beforehand.
- Consensus is achieved instantly.
B
C
D
Q15. In Proof of Work, the mining puzzle is designed to be:
- Easy to compute and easy to verify.
- Hard to compute and hard to verify.
- Hard to compute but easy to verify.
- Easy to compute but impossible to verify.
B
C
D
Q16. (Short answer) Why is finality in Nakamoto Consensus considered probabilistic rather than absolute?
Module 5 – Blockchain Data Structures and Nodes
Q17. Which of the following is included in a block header?
- The miner’s private key.
- Pending mempool transactions.
- The parent hash and Merkle root.
- The full world state.
B
C
D
Q18. A full node is best described as a node that:
- Stores only block headers.
- Stores and verifies the entire blockchain history.
- Mines blocks without verification.
- Only forwards gossip messages.
B
C
D
Q19. Mempool transactions are:
- Expired data discarded by the network.
- Unsigned messages awaiting hashing.
- Pending transactions waiting to be included in a block.
- Mining difficulty records.
B
C
D
Q20. (Short answer) Explain why light clients do not need the full blockchain to validate transactions.
This is a static WordPress-compatible quiz. To enable auto-grading, add JS via a plugin or import these questions into a quiz tool.
Answer Key (Lecturer Use Only)
- B
- B
- B
- (Short answer)
- C
- C
- A
- (Short answer)
- C
- B
- C
- (Short answer)
- B
- A
- C
- (Short answer)
- C
- B
- C
- (Short answer)