Questions 23/04/2023 (Nr: 84)
What are the different types of tokens, and can you provide an example for each type?
What is the difference between fungible and non-fungible tokens?
What is the difference between intrinsic and extrinsic tokens?
What is the difference between utility and equity tokens?
What is ERC223 and ERC721?
What is the ERC20 standard, and what are the required and optional functions defined by it?
What is the main purpose of oracles in the Ethereum blockchain?
What is the Immediate Read Oracle design pattern, and can you provide an example of its use?
What is the Request-Response Oracle design pattern, and how does it work?
What are the two main ways of data authentication for oracles?
What is IPFS, and how does it work?
What is Swarm, and how is it similar to IPFS?
What are Decentralized Message Communications Protocols, and which one is the most notable for DApps?
What is ENS?
What is the issue of governance in DApps?
Why is the nonce value in a transaction important?
How are nonces tracked, and what are the issues that can arise with nonces?
What is the Ethereum Virtual Machine (EVM)?
What is the Ethereum world state?
What is the difference between the code used when creating and deploying a smart contract?
What is gas in the context of the EVM, and how does it work?
What are smart contracts, and what is their functionality?
What are the characteristics of smart contracts?
What is the lifecycle of a smart contract, and how is it triggered?
What is the difference between declarative and imperative programming languages, and can you provide some examples of each?
What is the Solidity ABI, and how is it used?
What is Ethereum, and what are its key components?
How does Ethereum deal with DoS attacks and overuse of resources?
What is gas in Ethereum, and how is it used?
What is the incentive for participants in Ethereum's consensus algorithm?
What is the structure of a transaction?
How does the ECDSA work?
Explain the PoS algorithm.
Explain the PoW algorithm.
What is the difference between HD wallets and deterministic (seeded) wallets and nondeterministic (random) wallets?
What is the difference between a transaction and a message?
What is the use of an interface or function without implementation?
What are automated market makers?
What are collateral tokens?
What is a collateralized stablecoin?
What is fiat currency?
What is a liquidity pool?
Explain open position, its meaning, and risk in trading.
What is slippage?
What is spot price?
Explain asymmetric vs symmetric cryptography.
Explain what SHA-256 is, how it works, and its usage.
Explain what you know about storage vs. memory vs. calldata.
How can access control vulnerability arise?
Explain the account existence check for low-level calls.
Explain the arithmetic under/overflow vulnerability.
Explain the assert attack.
Explain the bad interface DOS vulnerability.
Explain the block timestamp manipulation vulnerability.
What is the bypassing contract check vulnerability?
Can you produce code with no effects in Solidity?
Explain the code size check vulnerability.
Explain the low-level function Delegatecall and the vulnerability that can occur when using it without caution.
Explain Denial of Service (DoS) attacks in Solidity.
Explain DoS with block gas limit.
Explain the concept of entropy illusion.
Explain the flash loan attack.
Explain the floating point and precision vulnerabilities.
Explain the function selector abuse vulnerability.
Explain smart contract gas griefing.
Explain hash collision and what parameters can lead to it.
What is improper array deletion in Solidity?
Explain call/transfer with hardcoded gas amount and how it can lead to a vulnerability
Explain the oracle manipulation vulnerability
Explain the public burn function vulnerability
Explain the read-only reentrancy vulnerability
Explain the single function reentrancy vulnerability
Explain the cross function reentrancy vulnerability
What is Race Conditions/Front Running vulnerability
Very briefly explain Right-To-Left-Override control character (U+202E) vulnerability
What does it mean to shadow state Variables?
Very briefly explain Short Address / Parameter attack
Explain Signature Malleability
Explain Signature Replay
What issues can arise from using Tx.origin ?
Explain Unchecked CALL Return Values vulnerability
Explain Unexpected ether vulnerability?
Explain Uninitialized Storage Pointers vulnerability?
How can we prevent unsafe iwnership transfer?
Last updated