May 31, 2024

Ответы на СertiK Skynet

(ТаскOndo Finance | RWA)
Question 1 of 2Ondo Finance moved $95 million to BlackRock's BUIDL in 2024 as part of their long-term strategy.
Ответ:True

Question 2 of 2What specific actions does Ondo Finance take to ensure regulatory compliance?
Ответ:Conducts compliance checks and engages with regulatory bodies


(Таск Web3 Security with Skynet)
Question 1 of 2
What feature of Skynet helps users assess the security of Web3 projects?
Ответ: Security Scores

Question 2 of 2
Verified source code is one of the common security threats in Web3.
Ответ:False


(Таск Operational Security)
Question 1 of 2
Non-blockchain components such as websites and software applications must be secured, as they can be targeted by hackers.
Ответ: True

Question 2 of 2
What makes bug bounty programs beneficial for Web3 projects?
Ответ: They harness community expertise to identify bugs

(Таск Team and Insider Risks)
Question 1 of 2
Why is it risky to invest in projects with anonymous teams?
Ответ: Lack of accountability and transparency

Question 2 of 2
The CertiK KYC Badge means that CertiK ensures code safety.
Ответ: False

(Таск PEPE | Meme)
Question 1 of 2
What significant security measures did Pepe implement to enhance trust and transparency?
Ответ: Undergoing a CertiK audit of its token contract

Question 2 of 2
How is the ownership of Pepe tokens distributed among holders?
Ответ:The top 10 holders own less than 5% of the total supply.

(Таск Aptos | Layer 1)
Question 1 of 2
Aptos is a Layer 1 blockchain primarily designed to offer:
Ответ: A developer-friendly environment, focusing on scalability and security

Question 2 of 2
Move is the programming language at the core of Aptos for smart contract development.
Ответ: True

(Таск Ondo Finance RWA)
Question 1 of 2
Ondo Finance moved $95 million to BlackRock's BUIDL in 2024 as part of their long-term strategy.
Ответ: True

Question 2 of 2
What specific actions does Ondo Finance take to ensure regulatory compliance?
Ответ: Conducts compliance checks and engages with regulatory bodies

(Таск TON | Layer 1)
Question 1 of 2
What does the MasterChain do in TON's network?
Ответ:Ensures consistency and security across the network

Question 2 of 2
What peak transaction speed did TON achieve in CertiK's performance testing?
Ответ:Over 100,000 TPS

(Таск Ripple (XRP Ledger) | Layer 1)
Question 1 of 2
What did CertiK audit for the XRP Ledger?
Ответ:The security of its Automated Market Maker (AMM) implementation

Question 2 of 2
What do social monitoring insights indicate about the XRPL community?
Ответ: Highly active and engaged

(Таск Wormhole | Infrastructure)
Question 1 of 2
Wormhole was originally incubated by Jump Trading
Ответ:True

Question 2 of 2
What is the maximum bounty offered by Wormhole’s bug bounty program?
Ответ: $5M

(Таск EigenLayer | Infrastructure)
Question 1 of 2
What unique model does EigenLayer use to enhance the security of other protocols?
Ответ: Shared security model leveraging staked ETH

Question 2 of 2
What purpose does the insurance mechanism serve in EigenLayer's ecosystem?
Ответ:To provide a safety net in case of protocol failures or hacks

(Таск Ethena | Stablecoin)
Question 1 of 2
What method does Ethena use to stabilize its synthetic dollar, USDe?
Ответ: Delta hedging

Question 2 of 2
What unique financial tool does Ethena introduce to offer on-chain yields?
Ответ: Internet Bond

(Таск Code Security)
Question 1 of 2
What is the main purpose of conducting security audits on Web3 code?
Ответ:To identify and fix potential security vulnerabilities

Question 2 of 2
A code repository’s regular updates and community involvement can be indicators of the team’s commitment to a project.
Ответ:True

(Таск Market-Related Risks)
Question 1 of 2
What is a risk associated with tokens being concentrated in few wallets?
Ответ :It increases the risk of market manipulation

Question 2 of 2
Why is high trading activity viewed positively in token markets?
Ответ: It indicates strong interest and potential liquidity.

(Таск Governance and Security in DAOs)
Question 1 of 2
Which issue is a common risk in DAO governance?
Ответ: Centralization risks in smart contract

Question 2 of 2
Community approval is usually required before implementing changes to a DAO’s project model.
Ответ:True

(Таск Community and Security Risks in Web3)
Question 1 of 2
Why is monitoring social media sentiment important for Web3 projects?
Ответ:Influences market stability and trust

Question 2 of 2
Transparency decreases trust in the Web3 community and should be minimized.
Ответ:False

(Таск Introduction to User Security)
Question 1 of 2
Why is user security particularly important in the world of crypto?
Ответ: Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds

Question 2 of 2
What additional security measure is recommended beyond a strong password?
Ответ:Two-Factor Authentication (2FA)

(Таск Introduction to Wallet Security)
Question 1 of 2
What is the primary risk of using custodial wallets?
Ответ: If the custodial service experiences a security breach, hack, or service itself becomes inaccessible, you may lose access to your private keys.

Question 2 of 2
What is a key practice for securing your wallet’s private keys?
Ответ: Storing them in a hardware wallet or encrypted offline location

(Таск Best Practices for Wallet Security)
Question 1 of 2
What should you regularly do with your wallet to ensure security?
Ответ:All of the above

Question 2 of 2
What should you always double-check before sending funds from your wallet?
Ответ:The recipient’s wallet address to ensure it’s correct

(Таск Choosing a Secure Exchange)
Question 1 of 2
Which of the following are key factors to consider when choosing a secure crypto exchange?
Ответ: All of the above

Question 2 of 2
Choosing an exchange with both licensing and security certifications minimizes the risks associated with using a cryptocurrency exchange.
Ответ: True

(Таск Proof of Reserve )
Question 1 of 2
Proof of Reserve (PoR) guarantees against future changes and hacking risks.
Ответ:False

Question 2 of 2
What is a limitation of Proof of Reserve?
Ответ:All of the above

(Таск Recognizing Risk Signals on the Exchange)
Question 1 of 2
Why should you be cautious if someone you don't know approaches you on social media about using a specific exchange?
Ответ: They might be recommending a scam or fraudulent scheme

Question 2 of 2
What could frequent or prolonged withdrawal freezes on an exchange indicate?
Ответ:The exchange has liquidity problems or internal issues

(Таск Important Exchange Security Features)
Question 1 of 2
What does ISO 27001 certification signify for a cryptocurrency exchange?
Ответ:The exchange has strong information security management systems

Question 2 of 2
What is the benefit of choosing an exchange with both proper licensing and security certifications?
Ответ:It minimizes the risks associated with using a cryptocurrency exchange

(Таск Private Key Security)
Question 1 of 2
Why is it important to keep your private key secure?
Ответ:If someone gains access to your private key, they gain access to your crypto assets

Question 2 of 2
What is a best practice for private key security?
Ответ:Store it offline, preferably in a hardware wallet

(Таск Private Key Security: Seed Phrases)
Question 1 of 2
What is a recommended strategy for backing up your seed phrase?
Ответ:Create a backup and store it in secure locations

Question 2 of 2
What is the main risk of storing your seed phrase digitally (e.g., in cloud storage or email)?
Ответ:It can be hacked or accessed by unauthorized parties

(Таск Losses Related to Private Key)
Question 1 of 2
How much was lost due to private key compromises in 2023?
Ответ:Nearly $881 million across 47 incidents

Question 2 of 2
Which of these exchanges did NOT experience a security incident related to a private key compromise?
Ответ:Binance

(Таск Website & dApp Security)
Question 1 of 2
A dApp is a centralized application that primarily runs on mobile devices.
Ответ:False

Question 2 of 2
What might indicate that a dApp is potentially malicious or risky?
Ответ:The dApp has limited documentation and transparency

(Таск Identifying Malicious Activity on Websites & dApps)
Question 1 of 2
How can you protect yourself from phishing attacks related to crypto websites and dApps?
Ответ:Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking

Question 2 of 2
What might indicate that a website is a scam or fake?
Ответ:The URL has subtle differences from the legitimate site, like extra characters or misspellings

(Таск FriendTech | Social)
Question 1 of 2
Friend.Tech launched its native token in May 2024, distributing it entirely to VCs.
Ответ:False

Question 2 of 2
What incentive does Friend.Tech provide through its bug bounty program?
Ответ:Rewards of up to 1,000,000 USDC based on bug severity

(Таск Worldcoin | Store of Value)
Question 1 of 2
Worldcoin uses biometric verification to ensure each person can only claim their share once.
Ответ:True

Question 2 of 2
What was a security vulnerability in Worldcoin’s Orb operator onboarding process?
Ответ:Operators could bypass verification without proper ID.

(Таск Losses Related to Private Key Compromises)
Question 1 of 2
How much was lost due to private key compromises in 2023?
Ответ:Nearly $881 million across 47 incidents

Question 2 of 2Which of these exchanges did NOT experience a security incident related to a private key compromise?
Ответ:Binance

(Таск HACK3D Part 1: Top Incident Analyses)
Question 1 of 3
Which of the following is NOT listed as a top incident type in Q1 2024?
Ответ:Network Congestion

Question 2 of 3
What was the eventual outcome of the attack on Munchables?
Ответ:The stolen assets were returned to the Munchables team

Question 3 of 3
What event occurred shortly before the BitForex exit scam, raising suspicions of fraudulent activities?
Ответ: The CEO's resignation

(Таск HACK3D Part 2: Private Key Compromise)
Question 1 of 3
What was the total loss attributed to private key compromises in Q1 2024?
Ответ:$239 million

Question 2 of 3
Who suffered a loss of $112 million due to the compromise of personal private keys in Q1 2024?
Ответ:Chris Larsen

Question 3 of 3
Storing all multisignature keys within the same BitWarden account is a secure practice.
Ответ: False

(Таск HACK3D Part 3: Rounding Issue Exploits)
Question 1 of 3
What is the primary target of the Rounding Issue Exploit?
Ответ:Newly-deployed lending pools

Question 2 of 3
What was the outcome of the flaw exploited in the Kyberswap incident?
Ответ:Drainage of funds

Question 3 of 3
Solidity's computational libraries are designed for high-precision mathematical operations, minimizing the risk of rounding errors.
Ответ:False

(Таск Build trust and integrity in project teams with KYC)
Question 1 of 3
Why is KYC important for Web3 projects?
Ответ: It helps users trust the team behind a project

Question 2 of 3
What does a CertiK KYC badge signify?
Ответ: The project team has undergone a thorough identity verification process

Question 3 of 3
How does CertiK's KYC service protect against insider threats?
Ответ:By conducting rigorous identity checks on core team members

(Таск KYC Actors are Ramping Up Their Game)
Question 1 of 3
What is a key observation by CertiK regarding KYC fraud?
Ответы:Fraudsters are hiring professional actors to circumvent due diligence

Question 2 of 3
What is CertiK's KYC Badge designed to do?
Ответы:Verify development teams and prevent fraud

Question 3 of 3
Why do KYC actors target traditional banks?
Ответ:To open bank accounts and store illicit funds

(Таск Unveiling the KYC Actor Industry)
Question 1 of 3
What insight did CertiK gain from a KYC actor?
Ответ:Passing regular verifications is easy

Question 2 of 3
What is the primary purpose of employing KYC actors according to CertiK's findings?
Ответ:To steal funds from investors

Question 3 of 3
What is essential for due diligence in Web3 start-ups according to CertiK?
Ответ:Thorough background investigation by professional investigators

(Таск Best Tools for Tracking Top Crypto Wallets)
Question 1 of 3
Which wallet tracking tool supports creating custom dashboards with personalized wallet insights?
Ответ:Dune Analytics

Question 2 of 3
Wallet tracking tools offer specific trading directions to make users money.
Ответ:False

Question 3 of 3
What does wallet tracking help with?
Ответ: Monitoring crypto market trends

(Таск How CertiK Does KYC)
Question 1 of 3
CertiK's KYC Badge process includes a video interview and identity verification to assess the background of key team members.
Ответ:True

Question 2 of 3
What are the main steps in CertiK's KYC verification process?
Ответ:Video Call, ID Check, Review & Award

Question 3 of 3
The CertiK KYC Badge means that CertiK ensures code safety.
Ответ:False

(Таск Trap Phishing on Trusted Platforms)
Question 1 of 2
What are phishers trying to obtain from users in Web3 phishing scams?
Ответ:Crypto wallet private keys and mnemonic phrases

Question 2 of 2
Phishing malware can steal private keys by asking users to download and run a fake game client.
Ответ:True

(Таск Different Mechanisms for Honeypot Scams)
Question 1 of 2
What is a common red flag that a token may be a honeypot scam?
Ответ:An all-green chart with no sells

Question 2 of 2
The blacklist mechanism in honeypot scams adds buyers to a whitelist, enabling them to sell their tokens freely.
Ответ:False

(Таск Introduction to Formal Verification)
Question 1 of 2
Formal verification is a mathematical approach that helps identify vulnerabilities not found through conventional testing or code reviews.
Ответ:True

Question 2 of 2
What does the specification language BISSOL help with in the formal verification process?
Ответ:Defining properties of contracts to be verified

(Таск How Exit Scammers Mint Tokens Undetected)
Question 1 of 2
What do exit scammers use to mint additional tokens without triggering a Transfer event?
Ответ:Bypassing the totalSupply metric

Question 2 of 2
Locked liquidity pool tokens create a false sense of security for investors during a rug pull scam.
Ответ: True

(Таск Introduction of Diamond Agency Contract)
Question 1 of 2
Facets in diamond proxy contracts are smaller contracts that implement specific features and are managed by a central diamond proxy.
Ответ:True

Question 2 of 2
Why should the initialize function be protected in diamond proxies?
Ответ:To prevent unauthorized access to privileged roles

(Таск Recognizing the Misuse of CertiK's Brand)
Question 1 of 2
What should you do if you're approached by someone claiming to represent CertiK but you doubt their legitimacy?
Ответ:Verify their credentials using CertiK’s Employee Verification tool

Question 2 of 2
Fake recovery services often target individuals who have already suffered financial losses, promising to recover funds but demanding upfront fees.
Ответ:True

(Таск Top Compliance Risks in Crypto)
Question 1 of 3
Which compliance risk involves using blockchain transactions for illegal activities like money laundering or terrorism financing?
Ответ:Exposure to illicit activities

Question 2 of 3
CertiK’s SkyInsights analyzes transaction fees and doesn’t help companies comply with global regulations.
Ответ:False

Question 3 of 3
How does SkyInsights help companies comply with global crypto regulations?
Ответ:By maintaining a repository of global regulations

(Таск Hedgey Finance Event Analysis)
Question 1 of 2
The Hedgey Finance exploit was due to a missing line of code that failed to revoke campaign approvals after cancellations, allowing unauthorized token transfers.
Ответ:True

Question 2 of 2
How much was initially stolen in the Hedgey Finance exploit?
Ответ: $2 million

(Таск Insights on Market Analytics)
Question 1 of 3
Which of the following metrics is NOT included in the Skynet Market Analytics section?
Ответ:Fully diluted market cap

Question 2 of 3
Which of the following factors might contribute to a potential drop in the Market Category Score? (Select all that apply)
Ответ:1-2-3

Question 3 of 3
Skynet Security Score incorporates insights from Market Analytics.
Ответ: True

(Таск Operational Security via Website Scan)
Question 1 of 3
Which are the primary categories of Website Scan? (Select all that apply)
Ответ: 1-3-4

Question 2 of 3
Negative scan results could suggest a project’s lack of attention to security.
Ответ:True

Question 3 of 3
Further assessment and improvement of website security can be achieved through?
Ответ: Penetration Testing


(Таск GitHub Monitoring for Better Code Security)
Question 1 of 3
Which of the following factors are considered by the GitHub Impact Indicator?
Ответ: All of the above

Question 2 of 3
If a project has a long existing GitHub account, age > 8 years, that means the project is secure and actively maintained?
Ответ: False

Question 3 of 3
Good looking Activity Heatmap means improved code security
Ответ: False - Introducing new code may also introduce bugs and vulnerabilities

(Таск Governance Activity Monitoring)
Question 1 of 3
Which of the statements best describes the governance indicator mentioned?
Ответ:It reflects the level of governance activity in comparison to other Web3 projects by aggregating various signals

Question 2 of 3
Projects with low governance activity indicators suggests lower risk compared to higher ones.
Ответ:False

Question 3 of 3
Which of the following values is not conveyed by governance activity?
Ответ:Project's financial performance

(Таск Insights on Token Holder Analysis)
Question 1 of 3
Governance related metrics such as token holder changes won’t impact Skynet security rating.
Ответ:False

Question 2 of 3
Which of the following metrics is NOT included in the Skynet Token Holder Analytics section?
Ответ:Total Value Locked (TVL)

Question 3 of 3
Which of the following factors might indicate the potential centralization risk of a project?
Ответ:High percentage on project owner holding

(Таск CertiK Ventures)
Question 1 of 2
Which is not part of CertiK Ventures’ current portfolio?
Ответ:Shiba Inu

Question 2 of 2
What is CertiK Ventures’ Vision?
Ответ: Foster the growth of security-first projects

(Таск Bot-Driven Wash Trading in Exit Scams)
Question 1 of 3
True or False: Scammers use Tornado Cash to withdraw funds for creating scam tokens.
Ответ:True

Question 2 of 3
Which platform do scammers use to distribute tokens among multiple addresses? (Select all that apply)
Ответ: 1-4

Question 3 of 3
What might trigger social bots to broadcast posts on scammer tokens? (Select all that apply)
Ответ: 1-2-3

(Таск Sonne Finance Incident Analysis)
Question 1 of 2
True or False: The precision loss vulnerability in CompoundV2 forks was first discovered in April 2023
Ответ: True

Question 2 of 2
What was the total amount lost in the Sonne Finance exploit?
Ответ: $20 million

(Таск Advanced Formal Verification of ZK Proofs)
Question 1 of 2
Which of the following best describes a Zero Knowledge Proof (ZKP)?
Ответ: A way to verify the correctness of a computation without revealing its details.

Question 2 of 2
True or False: The Load8 data injection bug in zkWasm is caused by improper tracking of call and return instructions, allowing hackers to inject fake returns and manipulate the execution sequence.
Ответ: False

(Таск zkSwap Finance | DeFi)
Question 1 of 3
What model does zkSwap Finance use to reward users?
Ответ:Swap to Earn

Question 2 of 3
How many files did CertiK audit of zkSwap Finance in December 2023?
Ответ: 6

Question 3 of 3
zkSwap Finance’s team is fully anonymous and unverified.
Ответ: False - The team has been KYC verified by CertiK

(Таск Security Rating for Pre-Launch Projects)
Question 1 of 3
Which of the following categories is not included in the pre-launch project rating?
Ответ: Market Stability

Question 2 of 3
Which of the Pre-Launch Stages represents the phase nearing a new market launch?
Ответ: Stage 2

Question 3 of 3
Which of the following factors might boost the project’s pre-launch stage status closer to a new launch?
Ответ: All of the above

(Таск Stay Vigilant on Browser Plugins)
Question 1 of 2
Which of the following is NOT considered a good security practice when using plugins?
Ответ: Using plugins promoted by users on social platforms

Question 2 of 2
How do scammers carry out plugin attacks?
Ответ: 1-2-3

(Таск How AI is Transforming KYC for Crypto Project Teams)
Question 1 of 2
What is a primary benefit of using AI in identity verification for KYC processes?
Ответ: Increased precision and speed in verifying identities

Question 2 of 2
CertiK uses AI to enhance its background check process for its CertiK KYC badge.
Ответ: True

(Таск Intro to Airdrop Scams)
Question 1 of 2
Legitimate airdrops require you to provide your private key.
Ответ: False - projects never ask for such information.

Question 2 of 2
Which is a common red flag of an airdrop scam?
Ответ: 1-2-3

(Таск Common Web3 Phishing Methods)
Question 1 of 2
To prevent wallet phishing attacks, verify the data and understand the transaction before signing.
Ответ:True

Question 2 of 2
You should always sign airdrops, even if the project team is unresponsive.
Ответ: False

(Таск Edu3Labs | The Future of Education)
Question 1 of 3
What are the 3 key areas Edu3Labs focuses on?
Ответ: 1-2-4

Question 2 of 3
What KYC Badge level Edu3Labs achieved from CertiK?
Ответ:Gold

Question 3 of 3
Which exchanges users can trade NFE?
Ответ: 1-3

(Таск Core DAO | Infrastructure)
Question 1 of 2
Core DAO combines Delegated Proof of Work (DPoW) and Delegated Proof of Stake (DPoS) in its consensus mechanism.
Ответ:True

Question 2 of 2
What ensures the scalability and security of Core DAO's blockchain?
Ответ: Satoshi Plus consensus mechanism

(Таск Understanding the Impact of FIT21 on Crypto Compliance)
Question 1 of 2
FIT21 distinguishes between digital assets considered as securities, commodities, and other forms of digital property.
Ответ: True

Question 2 of 2
What is one of the key goals of FIT21 for the U.S. blockchain and cryptocurrency sectors?
Ответ: To foster innovation and growth


(Таск Identifying and Avoiding Phishing Scams in X Replies)
Question 1 of 3
Which of the following statements are correct?
Ответ: 1-4

Question 2 of 3
In the MANEKI incident, what deceptive methods did the scammer use to trick users?
Ответ: 1-3-4

Question 3 of 3
Which of the following is NOT true about the End of Thread practice?
Ответ: Users could always trust messages prior to the End of Thread

(Таск Importance of Bug Bounty Programs in Web3)
Question 1 of 3
Bug bounty programs in Web3 can offer rewards in the form of tokens and cash.
Ответ: True

Question 2 of 3
What is a key benefit of bug bounty programs for Web3 projects?
Ответ:Use open source expertise for security

Question 3 of 3
Which projects have published their bug bounty programs on Skynet?
Ответ: 1-2-3-4

(Таск RWA Security and Leaderboard)

Question 1 of 2
What is a critical step in ensuring the security of tokenized real-world assets?
Ответ: Conducting regular smart contract audits

Question 2 of 2
True or False: Compliance with AML and KYC regulations is unnecessary for tokenized RWAs.
Ответ:False

(Таск Arbitrum | Layer 2)
Question 1 of 2
Who were the original developers of Arbitrum?
Ответ: Offchain Labs

Question 2 of 2
Does Arbitrum run a Bug Bounty program? If so, how much?
Ответ: Yes - $2,000,000

(Таск SkyKnight)
Question 1 of 3
What is the primary purpose of SkyKnight?
Ответ: To offer a fast and detailed security assessment tool for memecoins

Question 2 of 3
What are the key features of SkyKnight?
Ответ: Deep analysis of smart contract code and comprehensive reporting

Question 3 of 3
Who can benefit from using SkyKnight?
Ответ: Investors and developers

(Таск SkyInsights: Crypto Compliance)
Question 1 of 3
What is the primary objective of SkyInsights for Crypto AML and Compliance?
Ответ:To identify and analyze suspicious activities in cryptocurrency transactions

Question 2 of 3
Which regulatory body in the USA registers all Money Services Businesses dealing in Convertible Virtual Currency?
Ответ:FinCEN

Question 3 of 3
Which of the following are key features of SkyInsights? (Select all that apply)
Ответ: 1-2-4

(Таск Diamante Blockchain | Infrastructure)
Question 1 of 3
What did the April 2024 security audit conducted by CertiK find about Diamante Blockchain's smart contracts?
Ответ: No Medium, Major, or Critical issues

Question 2 of 3
What does the Gold KYC Badge signify in the context of Diamante Blockchain's team?Ответ: The team has been comprehensively verified, demonstrating high transparency

Question 3 of 3
What applications are supported by Diamante Blockchain?
Ответ: PayCircle and CreditCircle

(Таск OKX and CertiK Fast Pass Program)
Question 1 of 2
What role does CertiK play in the Fast Pass Program?
Ответ: Providing rigorous security audits for projects

Question 2 of 2
How can users benefit from the Fast Pass Program?
Ответ: By receiving regular updates and detailed security reports

(Таск PAW Chain | Ecosystem)
Question 1 of 3
How many signatures are required for funds to be moved from PAW Chain’s Treasury multisig wallet?
Ответ: 6

Question 2 of 3
What was the primary purpose of the CertiK KYC verification for the PAW Chain team?
Ответ: To ensure team transparency and reduce risk

Question 3 of 3
What is the function of PAW Aggregator in the PAW Chain ecosystem?
Ответ:Consolidates liquidity across different conditions to offer the best swap rates.

(Таск Evaluating Cryptocurrency News Sources)
Question 1 of 2
Community sources are inherently more trustworthy than those from professional sources.
Ответ: True

Question 2 of 2
What should you check to evaluate the reliability of a news source?
Ответ: 1-2-3-4

(Таск Trinique | RAT )
Question 1 of 3
What is the name for Trinique utility token?
Ответ: TNQ

Question 2 of 3
The TNQ token derives its value from active user base, token transaction volume, total value locked, and the performance of the asset classes.
Ответ: True

Question 3 of 3
Which KYC verification badge did Trinique's team receive from CertiK?
Ответ: Gold

(Таск Intro to Crypto Drainers )
Question 1 of 2
A crypto drainer can access your wallet through
Ответ: All above

Question 2 of 2
True or False: To protect against crypto drainers, it is recommended to use hardware wallets.
Ответ: True

(Таск Normie Incident Analysis)
Question 1 of 2
What measure could likely have prevented NORMIE’s security incident?
Ответ: A Smart Contract Audit

Question 2 of 2
What was the initial vulnerability in the NORMIE contract?
Ответ: Allowing any address receiving a specific number of tokens to become a premarket_user


(Таск SIM Swap Attacks )
Question 1 of 2
How can an attacker obtain your personal information? (Select all that apply)
Ответ: 1-3

Question 2 of 2
What is a common method to protect against SIM swap attacks?
Ответ:Use authentication apps like Okta or Authy.

(Таск Basics of Hackathons )
Question 1 of 2
Hackathons are places where white hat hackers receive rewards from bug counties
Ответ: False

Question 2 of 2
Competitive hackathons usually competitions between:
Ответ: Small Teams

(Таск Mint Club | Build Your Bonding Curve)
Question 1 of 3
What type of assets can be created using Mint Club's platform?
Ответ: ERC20 tokens and ERC1155 NFTs

Question 2 of 3
Which best describes the purpose of the MINT token on Mint Club?
Ответ: Base token for functionality and bonding curves

Question 3 of 3
What recognition did Mint Club's core team receive after completing KYC verification by CertiK?
Ответ: Gold badge

(Таск Protecting Yourself from Discord Scams)
Question 1 of 2
What tactic do scammers often use on Discord to exploit NFT investors?
Ответ: Posting fake offers for free mints or airdrops to exploit FOMO (Fear Of Missing Out)

Question 2 of 2
What should you do if you suspect your Discord account has been compromised?
Ответ: Reset your password as soon as possible and ensure 2FA is enabled

(Таск Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights)
Question 1 of 2
Which type of attack was the most costly in Q2 2024?
Ответ:Phishing

Question 2 of 2
What was the total financial loss due to security incidents in H1 2024?
Ответ: $1.19 billion

(Таск Hack3d Report Q2 H1 2024 - Part 2: Insights and Future Security Enhancements)
Question 1 of 2
What critical lesson was learned from the phishing attacks on DMM Bitcoin and 0x1e22?
Ответ: The need for user education and enhanced verification processes

Question 2 of 2
What is a crucial step to prevent address poisoning attacks?
Ответ: Meticulously verifying wallet addresses before transactions

(Таск Mint Club | Building Your Bonding Curve)
Question 1 of 2
What type of assets can be created using Mint Club's platform?
Ответ: ERC20 tokens and ERC1155 NFTs

Question 2 of 4
What’s the creator benefit of using Mint Club's Creator Royalties feature?
Ответ: It lets creators easily set royalties from 0% to 50% on their assets.

Question 3 of 4
What’s the creator benefit of using Mint Club's Airdrop tool?
Ответ: It simplifies the airdrop process with Public and Private options.

Question 4 of 4
What’s the creator benefit of using Mint Club's Bulksender tool?
Ответ: It allows creators to distribute tokens or NFTs on over 12 networks.

(Таск The Memecoin Markets of Springfield)
Question 1 of 3
Newly launched coins without any prior history/backing is susceptible to rugpulling.
Ответ: True

Question 2 of 3
As an inexperienced cryptotrader, you should trade heavily in newly launched coins as it consistently returns a profit.
Ответ: False

Question 3 of 3
Which address acted as the central fund collection hub for the rugpullers?
Ответ: Chief Wiggum

(Таск Proof of Work versus Proof of Stake)
Question 1 of 3
Which consensus mechanism is used by Bitcoin?
Ответ: Proof of Work

Question 2 of 3
Which is an advantage to using Proof of Stake?
Ответ: It saves massive amounts of energy

Question 3 of 3
What is an advantage of using Proof of Work?
Ответ : It has a high bar of entry, making it hard for attackers to manipulate

(Таск HanChain | Transforming Music Copyright)
Question 1 of 3
What services does HanChain provide to enhance fan engagement?
Ответ: MusiKhan, NFT-PLAY, AdKhan, and staking options

Question 2 of 3
How has HanChain ensured security for its platform and team?
Ответ: Top 10% security score, Certik's KYC verification, and ISO27001 certification

Question 3 of 3
What benefits does HanChain's decentralized copyright holder identity verification provide to artists?
Ответ: Copyright protection and fair compensation through royalties

(Таск Ordinals and the BRC-20 Standard)
Question 1 of 2
What is the BRC-20 token standard primarily used for on the Bitcoin network?
Ответ: Token creation and transfer

Question 2 of 2
The BRC-20 token standard relies on JSON file inscriptions for its operations.
Ответ: True

(Таск OpenGPU | Harnessing Decentralized GPU Computing)
Question 1 of 4
What does OpenGPU leverage to support AI and blockchain applications?
Ответ: Decentralized GPU computing

Question 2 of 4
How many operations per second can OpenGPU support?
Ответ: 5000

Question 3 of 4
What is the purpose of OpenGPU Devnet?
Ответ: To test and innovate with advanced tools

Question 4 of 4
How can users monetize their idle GPU resources on OpenGPU?
Ответ: By joining the decentralized computing network

(Таск Security Score Impacts with OKX)
Question 1 of 2
What is the main purpose of integrating Skynet's Security Score with third-party platforms?
Ответ: To increase security awareness

Question 2 of 2
Which feature is available for OKX Wallet users regarding Skynet's Security Score?
Ответ: Overall security score and subcategory scores

(Таск Top Performing Cryptocurrencies of H1 2024)
Question 1 of 2
What was the purpose of the merger between SingularityNET, Fetch.ai, and Ocean Protocol?
Ответ: To form a decentralized AI alliance

Question 2 of 2
Which token saw significant growth due to the launch of the TokenFi platform?
Ответ: FLOKI

(Таск Patex | Latin American Blockchain Ecosystems)
Question 1 of 4
What is the main focus of the Patex ecosystem?
Ответ: A comprehensive solution for the LATAM region

Question 2 of 4
What is the primary function of the Patex Network?
Ответ:To solve scalability issues, increase transaction speeds, and reduce fees

Question 3 of 4
What is the role of the PATEX token in the Patex Ecosystem?
Ответ: It serves as the main currency for transactions

Question 4 of 4
How does the Bug Bounty Program help Patex?
Ответ: By identifying and fixing security vulnerabilities

(Таск WazirX Hack Incident Analysis)
Question 1 of 3
How did attackers exploit WazirX?
Ответ: Compromised private key in a multisig wallet

Question 2 of 3
What was WazirX's immediate response to the hack?
Ответ: Paused all trading and withdrawals

Question 3 of 3
How much is WazirX offering as a bounty for the recovery of stolen funds?
Ответ: 10% of the total amount

(Таск Mintlayer | Build on Bitcoin)
Question 1 of 4
What is the primary function of Mintlayer's blockchain architecture?
Ответ: To improve direct token interoperability with Bitcoin

Question 2 of 4
How does Mintlayer enhance decentralization?
Ответ: By providing a built-in DEX for P2P transfers

Question 3 of 4
What types of tokens does Mintlayer support?
Ответ: Both fungible and non-fungible tokens

Question 4 of 4
What is the purpose of Mintlayer's staking protocol?
Ответ: To enable users to participate in the block signer auction and earn rewards

(Таск Skynet Pulse - Real-Time Insights by Security Experts)
Question 1 of 2
How can users access the Skynet Pulse feature?
Ответ: By clicking on the heart icon at the top of the Skynet homepage

Question 2 of 2
What information is provided next to each Pulse notification?
Ответ: The project’s security score and a link to their Skynet profile

(Таск CertiK's Journey to Samsung's Security Hall of Fame)
Question 1 of 3
What did CertiK's Skyfall team achieve in 2023?
Ответ: Secured a top five place in Samsung's Mobile Security Hall of Fame

Question 2 of 3
How many vulnerabilities did Skyfall discover in the Samsung Blockchain Keystore?
Ответ: Seven

Question 3 of 3
What types of vulnerabilities were found in the Samsung Blockchain Keystore?
Ответ: Critical and high severity vulnerabilities

(Таск Solidus AI Tech | High-Performance Computing)
Question 1 of 4
What security measures has Solidus AI Tech taken?
Ответ: 1-2-4

Question 2 of 4
What can users access through the GPU Marketplace?
Ответ: High-performance computing power

Question 3 of 4
What is the primary function of the $AITECH token within the Solidus AI Tech ecosystem?
Ответ: Payment for AI and GPU services

Question 4 of 4
How many core team members are verified by CertiK?
Ответ: 5

(Таск Hackers Infiltrating Crypto Job Boards)
Question 1 of 3
What is the annual revenue generated from fake hiring schemes?
Ответ: $600 million

Question 2 of 3
How many North Koreans are directed to infiltrate the tech industry according to the UN?
Ответ: 4,000

Question 3 of 3
What is one red flag during video interviews that can indicate a fake applicant?
Ответ: Refusing to turn on the camera

(Таск Setting Up a Security War Room)
Question 1 of 3
What type of communication platforms should be used for a war room?
Ответ: Secure messaging apps

Question 2 of 3
Why are drills and simulations important for a security war room?* Choose only one answer
Ответ: They identify weaknesses and improve team coordination

Question 3 of 3
What should be included in a post-mortem analysis?
Ответ: All of the above

(Таск Understanding BGP Hijacking and Internet Routing Security)
Question 1 of 3
What does BGP hijacking involve?
Ответ: Diverting traffic by announcing unauthorized IP address blocks

Question 2 of 3
What are some key measures to prevent BGP hijacking?
Ответ: 2-3-4

Question 3 of 3
What was the result of the KLAYswap BGP hijacking attack?
Ответ: Losses of $1.9 million

(Таск Apple Recognizes CertiK)
Question 1 of 3
How many times has Apple publicly thanked CertiK?
Ответ: 5

Question 2 of 3
CVE #1 could have enabled hackers to do which of the following?
Ответ: Identify the structure of kernel memory

Question 3 of 3
How did Apple address CVE #2?
Ответ: Improving buffer overflow protection

(Таск What Is a Keylogger?)
Question 1 of 2
How can you prevent hardware keyloggers?
Ответ: Regularly check USB ports for unfamiliar devices

Question 2 of 2
What is a common use of software keyloggers by cybercriminals?
Ответ: Stealing sensitive information

(Таск Understanding and Preventing Sybil Attacks)
Question 1 of 3
What is a Sybil attack?
Ответ: An attack where one person creates multiple identities to take over a network.

Question 2 of 3
What can a successful Sybil attack lead to in a blockchain network?
Ответ: All of the above.

Question 3 of 3
How do consensus algorithms help defend against Sybil attacks?
Ответ: By making it impractical and costly for attackers to succeed.

(Таск Script Network | Open Source Video Protocol)
Question 1 of 4
What is Script Network?
Ответ: A Layer 1 open-source live TV platform, protocol, and storage network

Question 2 of 4
What is the purpose of $SCPT in the Script Network ecosystem?
Ответ: Governance and staking

Question 3 of 4
How does Script Network ensure security and trust within its ecosystem?
Ответ: By completing security assessments, maintaining an active KYC verification, and a bug bounty program

Question 4 of 4
What can users do with Script TV?
Ответ: Watch multiple channels 24/7/365 and earn rewards

(Таск Vanity Address and Address Poisoning)
Question 1 of 3
What is the main risk of address poisoning?
Ответ: Sending funds to a scam address

Question 2 of 3
How can you protect yourself from address poisoning?* Choose only one answer
Ответ: Always double-check the entire address

Question 3 of 3
Vanity addresses are impossible to detect and there are no tools available to help users identify them
Ответ: False

(Таск Cold Wallets)
Question 1 of 3
When should you consider using a cold wallet?
Ответ: Storing your crypto assets offline for safe and long-term storage

Question 2 of 3
What are the different types of cold wallets?
Ответ: 1-2-4

Question 3 of 3
What should you do when purchasing a hardware wallet?
Ответ: 1-4

(Таск How to Create and Maintain Secure Passwords)
Question 1 of 3
Why should you avoid reusing passwords?
Ответ: To prevent hackers from accessing multiple accounts

Question 2 of 3
What makes a password complex?
Ответ: A mix of upper and lower case letters, numbers, and special characters

Question 3 of 3
How often should you change your passwords?
Ответ: Regularly to prevent expired passwords from being useful to hackers

(Таск UtopiaSphere Incident Analysis)
Question 1 of 2
What was the amount exploited from UtopiaSphere on 21 July 2024?
Ответ: $521K

Question 2 of 2
What mechanism was exploited in the UtopiaSphere incident?
Ответ: swapBurn()

(Таск Navigating DAO Governance and the Compound DAO Incident)
Question 1 of 3
What was the primary controversy in the Golden Boys' proposal to Compound DAO?
Ответ: The funds would be stored in a vault controlled by them

Question 2 of 3
What legal structure is recommended for DAOs to protect members from personal liability?
Ответ: Limited Liability Corporation (LLC)

Question 3 of 3
What method is suggested to improve governance participation in DAOs?
Ответ: Implementing weekend-free voting and experimenting with AI proxy voting

(Таск Mastering Bridge Tracing)
Question 1 of 3
What is the primary purpose of a Chain ID in bridge tracing?
Ответ: To uniquely identify a specific blockchain network

Question 2 of 3
What technique can be used to trace transactions when explicit details are not available?
Ответ: Timing Analysis

Question 3 of 3
What does decoding the input data of a transaction help you discover?
Ответ: The destination chain and recipient address

(Таск Introduction to Account Abstraction)
Question 1 of 2
What is NOT a benefit of Account Abstraction?
Ответ: Allowing for transactions to be conducted fully anonymously

Question 2 of 2
What is a real-world example where Ethereum’s account abstraction can be useful?
Ответ: All of the above

(Таск Evaluating Security with Skynet Token Scan)
Question 1 of 3
What does Skynet Token Scan primarily analyze?
Ответ: Smart contract code

Question 2 of 3
What type of tokens does Skynet Token Scan currently support?
Ответ: Solana

Question 3 of 3
What does the Skynet Token Scan report categorize findings by?
Ответ: Severity level

(Таск Understanding and Mitigating 51% Attacks)
Question 1 of 3
What happens in a 51% attack?
Ответ: An attacker gains control of more than half of the network’s computational power

Question 2 of 3
Which of the following is a potential consequence of a 51% attack?
Ответ: Double-spending of coins

Question 3 of 3
How can blockchain networks reduce the risk of a 51% attack?
Ответ: By distributing mining power widely and adjusting mining difficulty

(Таск How Binance Clawed Back $73M in Stolen Funds)
Question 1 of 3
What percentage of the $73 million recovered by Binance in 2024 was stolen through hacks, exploits, and thefts?
Ответ:80%

Question 2 of 3
How much did Binance recover in stolen funds during the entire year of 2023?
Ответ: $500 million

Question 3 of 3
What was a key factor contributing to the increase in stolen crypto assets in 2024?
Ответ: Increased market growth and volatility

(Таск Protecting Your PostgreSQL Database from Cryptojacking)
Question 1 of 3
PG_MEM targets PostgreSQL databases with strong passwords*
Ответ: False

Question 2 of 3
What does PG_MEM do once it infiltrates a PostgreSQL database?
Ответ: Creates a new user account with high privileges

Question 3 of 3
What is the primary method of defense against PG_MEM?
Ответ: Using strong, unique passwords and regular system updates

(Таск Stay Ahead with Skynet's Intelligent Calendar)
Question 1 of 2
What is one of the key event types tracked by Skynet’s Smart Calendar?
Ответ: Airdrops

Question 2 of 2
How can the Smart Calendar help you in the Web3 space?
Ответ: It tracks important Web3 events such as token unlocking and exchange listings

(Таск Understanding AI's Role in Enhancing Web3 Security)
Question 1 of 3
What is a key benefit of decentralizing data storage with AI?
Ответ: It enhances transparency and security.

Question 2 of 3
Why are proprietary AI models used in sensitive fields like healthcare?
Ответ: They offer data security.

Question 3 of 3
AI can fully address all complex security challenges in blockchain.* Choose only one answer
Ответ: False

(Таск SOC 2 Compliance for Crypto Companies)
Question 1 of 3
SOC 2 compliance is a one-time certification that does not require ongoing efforts
Ответ: False

Question 2 of 3
What are the key areas covered by SOC 2 compliance?
Ответ: Security, Availability, Processing Integrity, Confidentiality, and Privacy

Question 3 of 3
Why is SOC 2 compliance important for crypto companies?
Ответ: It helps demonstrate a commitment to data security and builds trust with users

(Таск KYC Leaderboard Showcase)
Question 1 of 2
What does the KYC Badge from CertiK signify?
Ответ: Verified identities of key team members

Question 2 of 2
What is the significance of a Gold badge on the KYC Leaderboard?
Ответ: Full verification with low risk and high transparency

(Таск Prioritize Wallet Security with Skynet Wallet Scanning)
Question 1 of 2
What is the primary purpose of Skynet's Wallet Scan?
Ответ: To identify high-risk approvals and potential threats

Question 2 of 2
What does Wallet Scan provide after analyzing a wallet address?
Ответ: Risky approvals and value at risk

(Таск Evaluating Popular Web3 Messaging Apps)
Question 1 of 2
Which messaging app offers full end-to-end encryption for all communication?
Ответ: Signal

Question 2 of 2
Which app is currently exploring deeper crypto integration through the TON project?
Ответ: Telegram

(Таск Understanding Soft Rug vs. Hard Rug Pulls_
Question 1 of 2
What is an example of a hard rug pull?
Ответ: Developers abandoning and removing liquidity, leaving investors with worthless tokens

Question 2 of 2
What is a common signal of a soft rug pull?
Ответ: Gradual selling of tokens by the development team

(Таск Empowering Your Web3 Journey with Advanced Security Tools)
Question 1 of 3
What feature of Skynet provides a clear snapshot of a Web3 project's security and risk profile?
Ответ: Security Score

Question 2 of 3
Which tool in Skynet helps you detect high-risk wallet authorizations to protect your digital assets?
Ответ: Wallet Scan

Question 3 of 3
What does Skynet Pulse offer to keep users informed in the Web3 space?
Ответ: Real-time updates and trends from various sources

(Таск Web2 Meets Web3: Hacking Decentralized Applications)
Question 1 of 3
What is a primary security challenge in Web3 Dapps?
Ответ: Integration of Web2 vulnerabilities and blockchain-specific issues.

Question 2 of 3
What type of Dapp architecture includes both server-side APIs and blockchain interactions?
Ответ: Full-Scale Dapp

Question 3 of 3
How can an attacker exploit client-side vulnerabilities in a Web3 Dapp?
Ответ: By injecting malicious JavaScript to initiate unauthorized transactions

(Таск FBI warns of Crypto Social Engineering)
Question 1 of 3
What is one common tactic used by North Korean scammers in crypto schemes?
Ответ: Impersonating well-known individuals

Question 2 of 3
What should you do if you receive an unsolicited job offer related to cryptocurrency?
Ответ: Verify the offer through official channels

Question 3 of 3
How can you protect yourself from malware distributed through social engineering schemes?
Ответ: Use security software and verify sources

(Таск Case Study on Enhancing Security for App Chains)
Question 1 of 2
What was the primary impact of the CWA-2023-004 vulnerability?
Ответ: All subsequent transactions failed while nodes appeared operational

Question 2 of 2
What key measure was introduced in the security patch to mitigate the vulnerability?
Ответ: Limiting the total number of functions within a contract.

(Таск Understanding the Android SpyAgent Campaign)
Question 1 of 2
What is the primary target of the SpyAgent malware?
Ответ: Mnemonic recovery phrases

Question 2 of 2
Which method does SpyAgent use to spread malware?
Ответ: Phishing campaigns

(Таск OKX Wallet | Multi-Chain Web3 Wallet)
Question 1 of 2
Which feature in OKX Wallet allows users to swap tokens across multiple networks?
Ответ: DEX & Bridge Aggregator

Question 2 of 2
What does the OKX Wallet dashboard provide to users?
Ответ: Overview of digital assets, portfolio performance, and transaction history

(Таск DEXTools | Real-Time Trading Insights)
Question 1 of 3
What is the primary function of DEXTools?
Ответ: To provide real-time analytics and insights for decentralized exchanges

Question 2 of 3
Which DEXTools feature highlights the top-performing tokens and trading pairs over the past 24 hours?
Ответ: Trending 24-Hour Charts.

Question 3 of 3
What benefits does holding DEXT tokens provide on the DEXTools platform?
Ответ: Reduced fees, access to premium features, and participation in governance

(Таск Polymarket | Prediction Markets)
Question 1 of 3
What makes Polymarket different from traditional betting platforms?
Ответ: It operates without the need for intermediaries, using blockchain technology for decentralized control.

Question 2 of 3
Which of the following best describes how prices are set for shares in Polymarket?
Ответ: Prices fluctuate based on the collective trading activity and predictions of users.

Question 3 of 3
What incentive does Polymarket offer to enhance the security of its platform?
Ответ: A bug bounty program with rewards of up to $1,000,000 for identifying security vulnerabilities

(Таск WEXO | Global Payment Infrastructure)
Question 1 of 4
What unique advantage does the WEXO Wallet provide to users?
Ответ: Allows conversion between digital and fiat currencies within the wallet

Question 2 of 4
What feature of WEXO specifically targets businesses looking to integrate cryptocurrency payments?
Ответ: Bitcoin Lightning POS

Question 3 of 4
How does WEXO enhance its ecosystem participation through its native token?
Ответ: By allowing access to premium features and reduced transaction fees within the platform

Question 4 of 4
What distinguishes WEXO’s security approach in the cryptocurrency space?
Ответ: Regular security audits linked to on-chain verified smart contracts

(Таск Understanding the DeRec Alliance)
Question 1 of 3
What is the primary purpose of the DeRec Alliance?
Ответ: Standardize secrets management and recovery

Question 2 of 3
How does DeRec protect user secrets?
Ответ: By using encrypted fragments held by multiple helpers

Question 3 of 3
Which feature makes DeRec different from ERC-4337?
Ответ: Support for on-chain and off-chain secrets

(Таск Understanding Economic Exploits and Tokenomics)
Question 1 of 3
What is an economic exploit in the context of tokenomics?
Ответ: Manipulating financial mechanisms for profit

Question 2 of 3
What is the significance of token distribution?
Ответ: It influences decentralization and market stability

Question 3 of 3
Why are vesting schedules important for tokenomics?
Ответ: They prevent token supply from being immediately flooded

(Таск Secure Use of Exchanges)
Question 1 of 3
Which security feature should you enable to prevent unauthorized account access?
Ответ: Two-Factor Authentication (2FA)

Question 2 of 3
What is the main reason for using a hardware wallet?
Ответ: It stores your cryptocurrency offline, providing better security

Question 3 of 3
Which of the following is an indicator of a phishing attack?
Ответ: Receiving an unsolicited email with a link to reset your password

(Таск A $230M Bitcoin Scam Uncovered)
Question 1 of 2
How much Bitcoin was stolen in the scam?
Ответ: 4,100 BTC

Question 2 of 2
What method did the scammers use to steal the victim’s Bitcoin?
Ответ: Posing as Google and Gemini support

(Таск Intro to AML and its Role in Crypto)
Question 1 of 3
What is the first step of money laundering?
Ответ: Placement

Question 2 of 3
Why do exchanges use KYC?
Ответ: To verify users' identities

Question 3 of 3
Why is crypto attractive for money laundering?
Ответ: It’s hard to trace transactions

(Таск CertiK Uncovers Vulnerability in Apple Vision Pro)
Question 1 of 3
What was the name of the vulnerability discovered in the Apple Vision Pro?
Ответ: GAZEploit

Question 2 of 3
What accuracy did CertiK researchers achieve in reconstructing messages from eye-tracking data?
Ответ: 92%

Question 3 of 3
How many times has CertiK been publicly acknowledged by Apple?
Ответ: Six times

(Таск Understanding the Peel Chain Technique)
Question 1 of 2
What is peeling in cryptocurrency?
Ответ:A laundering technique dividing a large amount into small transactions

Question 2 of 2
What is the goal of peeling?
Ответ: To hide funds through a series of small transactions

(Navigating NFT Security and Avoiding Scams)
Question 1 of 3
How can the authenticity of an NFT be verified?
Ответ: By checking the creator's profile and NFT metadata.

Question 2 of 3
What is a secure way to store NFTs?
Ответ: In a hardware wallet that supports NFTs.

Question 3 of 3
Which action helps protect against phishing scams?
Ответ: Enabling two-factor authentication on accounts.

(Таск Protecting Against Social Engineering Attacks)
Question 1 of 3
What is targeted social engineering?
Ответ: Tricks aimed at specific individuals to steal sensitive information.

Question 2 of 3
Which is a warning sign of a social engineering attack?
Ответ: An email with urgent requests for confidential information.

Question 3 of 3
What should you do if you receive a suspicious request?
Ответ: Verify the request using a trusted method

(Таск Exploring Etherscan)
Question 1 of 3
What is the primary function of Etherscan?
Ответ: A search engine for Ethereum's blockchain data

Question 2 of 3
What can be found by searching a wallet address on Etherscan?
Ответ: Transaction history, token balances, and NFTs

Question 3 of 3
Etherscan enables direct interaction with Ethereum smart contracts.
Ответ: True

(Таск MetaMask Overview)
Question 1 of 3
What is the primary function of MetaMask?
Ответ: Serving as an Ethereum wallet and gateway to DApps.

Question 2 of 3
How does MetaMask help with security?
Ответ: By providing a Secret Recovery Phrase for wallet recovery.

Question 3 of 3
What should users be cautious of when using MetaMask with DApps?
Ответ: Connecting to unverified or suspicious DApps.

(Таск Phantom Wallet | Solana and Web3 Wallet)
Question 1 of 3
What is one of the main features of Phantom Wallet?
Ответ: Ability to store and manage Solana tokens and NFTs

Question 2 of 3
You can swap tokens within Phantom Wallet without using an external exchange.
Ответ: True

Question 3 of 3
What does Phantom’s Bug Bounty Program offer?
Ответ: Up to $50,000 in rewards for reporting security vulnerabilities

(Таск CertiK Ventures Announcement in Singapore)
Question 1 of 3
How much is CertiK Ventures investing?
Ответ: $45 Million

Question 2 of 3
Which tools did CertiK introduce for free?
Ответ: 1-2

Question 3 of 3
How much in assets has CertiK protected?
Ответ: $360 Billion.

(Таск Understanding Chain Hopping and Crypto Money Laundering)
Question 1 of 2
How do DeFi mixers obscure the origin of funds?
Ответ: By pooling and redistributing cryptocurrencies among multiple users

Question 2 of 2
Chain hopping is expected to become less prevalent as more cross-chain analytics tools are developed.
Ответ: False

(Таск How the DHS is Stopping Ransomware Attacks)
Question 1 of 3
What is ransomware?
Ответ: A type of malware that locks data and demands payment to unlock it.

Question 2 of 3
How many attacks has DHS stopped since 2021?
Ответ: 537

Question 3 of 3
What is a key challenge for DHS when stopping ransomware attacks?
Ответ: Gathering evidence to prosecute hackers.

(Таск About Satoshi Nakamoto)
Question 1 of 3
What year did Satoshi release the Bitcoin whitepaper?
Ответ: 2008

Question 2 of 3
When did Satoshi stop communicating?
Ответ: 2011

Question 3 of 3
How many Bitcoin is Satoshi estimated to own?
Ответ: 1 million BTC

(Таск Hack3d Part 1: Most Common Attack Vectors in Q3 2024)
Question 1 of 2
What was the most costly attack vector in Q3 2024?
Ответ: Phishing

Question 2 of 2
How can you protect yourself from phishing attacks?
Ответ: Double-check URLs and email addresses for legitimacy

(Таск Hack3d Part 2: Major Hacks of Q3 2024)
Question 1 of 2
How much did the Bitcoin whale lose in the phishing attack?
Ответ: $238 million

Question 2 of 2
What caused the WazirX hack?
Ответ: Private key theft

(Таск Identifying Crypto Market Manipulation)
Question 1 of 2
What is the purpose of wash trading?
Ответ: To create fake trading activity.

Question 2 of 2
What happens in a pump-and-dump scheme?
Ответ: Tokens are artificially inflated and then sold off

(Таск What is DePIN?)
Question 1 of 2
What does DePIN stand for?
Ответ: Decentralized Physical Infrastructure Network

Question 2 of 2
Which project is an example of DePIN in data storage?
Ответ: Filecoin

(Таск Radiant Capital’s $50M DeFi Hack Response)
Question 1 of 3
How did the attackers breach Radiant Capital?
Ответ: By compromising developer hardware wallets with malware

Question 2 of 3
What security change did Radiant make to its multisig wallets?
Ответ: Reduced signers to seven, with four required for approval

Question 3 of 3
What delay is now enforced for contract updates and ownership transfers?
Ответ: 72 hours

(Таск Understanding U.S. Crypto Tax Forms)
Question 1 of 3
Which form is used to report capital gains or losses from crypto transactions?
Ответ: Form 8949

Question 2 of 3
You only need to report crypto income if it exceeds $600.
Ответ: False

Question 3 of 3
What is the primary distinction between short-term and long-term capital gains?
Ответ: The duration the asset was held

(Таск Interview with Professor Ronghui Gu: "Who Monitors the Monitors?")
Question 1 of 3
What percentage of blockchain financial losses are caused by private key leaks?
Ответ: 50%

Question 2 of 3
How does CertiK ensure its audit reports are transparent?
Ответ: By making them public on the Skynet platform

Question 3 of 3
What is one key area of focus for improving Web3 security?
Ответ: Decentralizing authentication and data storage

(Таск Defending Against Clipper Malware)
Question 1 of 3
What does clipper malware do?
Ответ: Replaces copied crypto wallet addresses with hacker-controlled addresses

Question 2 of 3
Which apps are targeted by repackaged versions of malware?
Ответ: Messaging apps like WhatsApp and Telegram

Question 3 of 3
What is one way to protect yourself from clipper malware?
Ответ: Verify wallet addresses before sending funds

(Таск Exploring the Rise of AI Memecoins)
Question 1 of 3
What has driven the surge in AI memecoin popularity in 2024?
Ответ: Increased retail trading and viral hype

Question 2 of 3
Which blockchain has seen a 39% rise in trading volume due to AI memecoins?
Ответ: Solana

Question 3 of 3
What is one reason retail traders prefer memecoins over venture-backed tokens?
Ответ: Memecoins are launched with all supply unlocked

(Таск Exploring the Security Model for Optimism’s Superchain)
Question 1 of 3
What is Optimism?
Ответ: A Layer 2 scaling solution for Ethereum

Question 2 of 3
How does Optimism maintain security while processing transactions off-chain?
Ответ: By posting transaction data to Ethereum

Question 3 of 3
What ensures that invalid transactions on Optimism are corrected?
Ответ: Fraud proofs

(Таск Proof of History Overview)
Question 1 of 4
What is Proof of History (PoH)?
Ответ: A cryptographic time-keeping mechanism

Question 2 of 4
What hashing algorithm does PoH use to create timestamps?
Ответ: SHA-256

Question 3 of 4
How does PoH help improve Solana's performance?
Ответ: By reducing the time needed for transaction ordering.

Question 4 of 4
Why did Solana implement PoH?
Ответ: To achieve high throughput and scalability

(Таск Unmasking Crypto Market Manipulation)
Question 1 of 3
What is wash trading?
Ответ: Buying and selling an asset to create fake trading volume

Question 2 of 3
What does spoofing involve?
Ответ: Placing large fake orders to manipulate prices

Question 3 of 3
What is a key characteristic of a pump and dump scheme?
Ответ: Coordinated buying followed by mass selling

(Таск Truth Terminal - An AI and a Crypto Millionaire)
Question 1 of 2
Is Truth Terminal the Creator of the Meme Token GOAT?
Ответ: False

Question 2 of 2
How Much Truth Terminal Received from Marc Andreessen?
Ответ: $50,000 in BTC

(Таск AI Memecoins Explained: The New Craze in Crypto)
Question 1 of 2
What is a key feature of AI memecoins?
Ответ: Viral meme-based marketing

Question 2 of 2
Which AI memecoin gained attention through the "Goatse Gospels"?
Ответ: Goatseus Maximus

(Таск Case Study on the Risks of Phishing Attacks in DeFi)
Question 1 of 3
What was the main vulnerability exploited in this phishing attack?
Ответ: Ownership transfer of DSProxy

Question 2 of 3
Which tool was used by the attacker to lure the victim?
Ответ: Inferno Drainer

Question 3 of 3
How did the attacker ultimately control the Maker vault?
Ответ: By transferring ownership of the DSProxy

(Таск The Power of Hashing)
Question 1 of 2
Hashing is primarily developed for cost saving
Ответ: False

Question 2 of 2
Hashing can be used for which of the following functions
Ответ: 1-2

(Таск Evaluating Memecoin Liquidity)
Question 1 of 3
What is a primary benefit of high liquidity in a memecoin?
Ответ: Reduces price volatility

Question 2 of 3
Which metric offers insights into active trading within a memecoin’s market?
Ответ: 24-hour trading volume

Question 3 of 3
Low liquidity in a memecoin ensures easy buying and selling without affecting the price.
Ответ: False

(Таск Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 1)
Question 1 of 3
Why is it risky if one wallet controls a large portion of liquidity?
Ответ: It allows one party to manipulate price or withdraw liquidity easily

Question 2 of 3
What does it mean if a token’s metadata is changeable?
Ответ: The team can alter the token’s attributes, which may be misleading.

Question 3 of 3
What does a high Token Scan Score (80+) indicate?
Ответ: A generally low-risk token, though flagged issues should be reviewed.

(Таск Analyzing Security for Solana-Based Memecoins with CertiK’s Token Scan - Part 2)
Question 1 of 3
What does it mean if Mint Authority is active on a token?
Ответ: The team can mint additional tokens, potentially inflating supply

Question 2 of 3
Why is a high Major Holders Ratio considered a risk?
Ответ: It increases the risk of price manipulation by a few large holders

Question 3 of 3
Which tool can you use to monitor real-time trading activity and identify potential red flags?
Ответ: DEXTools

(Таск Pump.Fun)
Question 1 of 3
What makes Pump.fun unique in the meme coin market?
Ответ: It has a live streaming feature for promoting tokens

Question 2 of 3
Pump.fun charges users to create tokens.* Choose only one answer
Ответ: False

Question 3 of 3
Which network is Pump.fun built on?
Ответ: Solana

(Таск Enhancing Security Awareness for Web3 Desktop Wallets)
Question 1 of 2
Why are weak encryption algorithms used in some desktop wallets a security issue?
Ответ: They are vulnerable to brute-force attacks

Question 2 of 2
What is a key benefit of using an MPC wallet for digital asset security?
Ответ: It divides private keys across multiple participants, reducing single points of failure

(Таск CryptoBottle Incident Analysis)
Question 1 of 3
What was the total loss resulting from the CryptoBottle incidents in October 2024?
Ответ: ~$527,000

Question 2 of 3
What vulnerability in the swap() method allowed the October 24 exploit to succeed?
Ответ: Disabled balance check

Question 3 of 3
What function did the attacker use to acquire large amounts of NAS tokens with minimal USDT?
Ответ: Invest()

(Таск Cybersecurity Best Practices for Telegram)
Question 1 of 3
What is the purpose of enabling two-step verification on Telegram?
Ответ: To add an extra layer of security with a password

Question 2 of 3
Which feature should you use for end-to-end encrypted conversations?
Ответ: Secret Chats

Question 3 of 3
By default, all Telegram chats are end-to-end encrypted.
Ответ: False

(Таск Understanding Stablecoin Reserves)
Question 1 of 3
What backs fiat-backed stablecoins?
Ответ: Fiat currency reserves

Question 2 of 3
Why is overcollateralization used in crypto-backed stablecoins?
Ответ: To hedge against the volatility of crypto assets

Question 3 of 3
Algorithmic stablecoins rely on traditional reserves to maintain their peg.
Ответ: False

(Таск GOAT | AI Bot Meme)
Question 1 of 3
What was the primary factor behind Goateus Maximus ($GOAT) gaining sudden popularity?
Ответ: Endorsement by an AI agent and a donation from Marc Andreessen

Question 2 of 3
Terminal of Truths, an AI bot, directly created the $GOAT token.
Ответ: False

Question 3 of 3
Who manages the Terminal of Truths AI agent?
Ответ: Andy Ayrey

(Таск Multi-Signature Wallets Explained)
Question 1 of 3
What is the primary purpose of a multi-signature wallet?
Ответ: To require multiple approvals for transactions

Question 2 of 3
In a 3-of-5 multi-sig wallet setup, how many signatures are required for a transaction?
Ответ: 3

Question 3 of 3
Multi-sig wallets are only useful for large organizations.
Ответ: False

(Таск TNQ)
Question 1 of 3
Which of the following is the utility token for TNQ’s ecosystem?
Ответ: TNQ

Question 2 of 3
The TNQ Token can be used for token Locking, DeFi Bots subscription, and performing transactions within the TNQ’s ecosystem.
Ответ: True

Question 3 of 3
Which KYC verification badge did TNQ's team receive from CertiK?* Choose only one answer
Ответ: Gold

(Таск Securing Solana SPL Contracts)
Question 1 of 2
What is a key feature of Solana's account-based model?
Ответ: Predefined accounts for program execution

Question 2 of 2
What is a best practice for Cross-Program Invocations?
Ответ: Use CPIs with trusted programs only

(Таск How to Ace the CertiK KYC Badge)
Question 1 of 3
What does the CertiK KYC Badge signify?
Ответ: The project team is transparent and verified.

Question 2 of 3
What behavior should you avoid during the KYC process?
Ответ: Using fake IDs or hiding key team members.

Question 3 of 3
Why is the CertiK KYC Badge beneficial?
Ответ: It builds trust and enhances transparency.

(Таск Protecting Against Crypto Phishing Scams During the Holiday Season)
Question 1 of 3
|What is a common tactic used by crypto phishing scammers?* Choose only one answer
Ответ: Sending malicious transactions for users to sign

Question 2 of 3
Why does the holiday season increase phishing risks?
Ответ: Online transactions increase, creating more opportunities

Question 3 of 3
It’s safe to use public WiFi for checking your crypto wallets during the holiday season.
Ответ: False

(Таск Stablecoin Risks: Identifying and Mitigating Vulnerabilities)
Question 1 of 3
What is a common risk with fiat-backed stablecoins like USDT or USDC?
Ответ: Dependency on centralized custodians

Question 2 of 3
What caused the TerraUSD collapse?
Ответ: A failure in its algorithmic stabilization system

Question 3 of 3
What is one way to reduce risks when using stablecoins?
Ответ: Diversify across multiple stablecoins with transparent audits

(Таск Understanding the Polter Finance Exploit)
Question 1 of 3
What caused the vulnerability in Polter Finance’s system?
Ответ: Price oracle relying solely on spot prices.

Question 2 of 3
How did the attacker inflate the price of BOO?
Ответ: By manipulating liquidity pairs via flashloans.

Question 3 of 3
What is a key lesson from the Polter Finance exploit?
Ответ: Validate oracle prices with historical data.

(Таск Clipper DEX Withdrawal Vulnerability Exploit)
Question 1 of 3
What was the root cause of the Clipper DEX exploit?
Ответ: Vulnerability in the withdrawal function

Question 2 of 3
What action did Clipper take to prevent further exploitation?
Ответ: Paused swaps and deposits, requiring mixed-asset withdrawals

Question 3 of 3
The Clipper exploit affected all liquidity pools on the platform.
Ответ: False

(Таск Understanding SkyNode: Blockchain’s Secure Foundation)
Question 1 of 3
What is a key feature of CertiK SkyNode?
Ответ: It secures and optimizes blockchain nodes.

Question 2 of 3
What is one benefit of SkyNode’s performance dashboard?
Ответ: Tracks staking rewards and validator metrics.

Question 3 of 3
SkyNode reduces the latency of historical data retrieval by 95%.
Ответ: True

(Таск Quantum Computing and the Future of Cryptocurrency Security)
Question 1 of 3
What enables quantum computers to solve problems faster than classical computers?
Ответ: They use qubits that can represent multiple states at once

Question 2 of 3
What makes ECDSA essential to Bitcoin’s security?* Choose only one answer
Ответ: It ensures only valid users can sign transactions

Question 3 of 3
Why are quantum computers not an immediate threat to blockchains?
Ответ: Current quantum computers lack the number of qubits required to break blockchain encryption

(Таск Blockchain Data Protection and Privacy Compliance)
Question 1 of 2
What does a hybrid storage model accomplish?
Ответ: It separates sensitive data into off-chain systems while keeping audit logs on-chain

Question 2 of 2
How do Zero-Knowledge Proofs help with compliance?
Ответ: By verifying data validity without exposing underlying information

(Таск Unlocking Ethereum ETFs With BlackRock’s ETHA)
Question 1 of 3
What does a spot Ethereum ETF hold?
Ответ: Ether tokens

Question 2 of 3
Which company manages ETHA?
Ответ: BlackRock

Question 3 of 3
Spot Ethereum ETFs track the real-time price of ether by holding the asset directly.
Ответ: True

(Таск Fundraising in the Web3 Industry)
Question 1 of 3
What is the primary purpose of an ICO?
Ответ: To distribute tokens in exchange for capital

Question 2 of 3
How do DAOs differ from traditional fundraising methods?
Ответ: They allow community members to vote on fund allocation.

Question 3 of 3
Venture capital funding always involves issuing tokens.
Ответ: False

(Таск World of Dypians | Future of Gaming, DeFi, NFTs and AI)
Question 1 of 3
What distinguishes the World of Dypians (WOD) game mechanics from traditional gaming models?
Ответ: A combination of PvE, PvP, and blockchain-based features

Question 2 of 3
How does the interactive in-game map contribute to the overall gameplay experience in WOD?
Ответ: By enabling exploration of diverse regions and discovery of hidden challenges

(Таск CertiK Hack3d 2024 Part 1 - Web3 Security by the Numbers)
Question 1 of 3
Approximately how much was lost in Web3 hacks, scams, and exploits in 2024?
Ответ: $2.3 billion

Question 2 of 3
What was the most costly attack vector in 2024?
Ответ: Phishing

Question 3 of 3
Which blockchain experienced the most security incidents in 2024?
Ответ: Ethereum

(Таск CertiK Hack3d 2024 Part 2 - Uncovering Major Incidents)
Question 1 of 3
What tactic was used in the DMM Bitcoin exploit?
Ответ: Address poisoning

Question 2 of 3
Which high-profile incident involved stolen funds returned to the victim?
Ответ: $129 Million Address Poisoning Case

Question 3 of 3
How much was stolen in the largest social engineering attack of 2024?
Ответ: $243 million

(Таск CertiK Hack3d 2024 Part 3 - Building a Resilient Web3 Ecosystem
Question 1 of 2
What is the primary purpose of CertiK’s Wallet Scan tool?
Ответ: Detect high-risk wallet authorizations

Question 2 of 2
Which defensive measure helps protect against phishing?
Ответ: Verifying URLs before interacting

(Таск Kendu Inu | Organic Meme Community)
Question 1 of 2
What is the primary approach Kendu Inu uses to grow its ecosystem?
Ответ:Organic community-driven engagement

Question 2 of 2
What does the 2024 CertiK audit of Kendu Inu reveal?
Ответ: Two major findings related to centralization were resolved

(Таск Protecting Web3 Workers from Fake Meeting App Scams)
Question 1 of 3
How do attackers make their fake apps look credible?
Ответ: By creating professional websites and social media accounts using AI

Question 2 of 3
What’s a key sign of a fake meeting app scam?
Ответ: Frequent name changes for the app

(Таск Massa | The First Decentralized Cloud Network)
Question 1 of 3
What is the primary benefit of Massa's parallel block architecture?
Ответ: It enables simultaneous block production across multiple threads for unmatched scalability

Question 2 of 3
How do Autonomous Smart Contracts (ASCs) on Massa differ from traditional smart contracts?
Ответ: They operate independently based on predefined conditions

Question 3 of 3
What does the Massa Bridge enable?
Ответ: The transfer of ERC-20 tokens like USDC, DAI, and WETH between Ethereum and Massa

(Таск Scam Pattern on Telegram Safeguard)

Question 1 of 2
What is the first step of this scam?
Ответ: Scammers impersonate KOLs to lure users into joining groups

Question 2 of 2
What are the warning signs during bot verification?
Ответ: 1-2-3-4

(Таск Protect your cryptocurrency from dust attacks.)
Question 1 of 2
How does a dusting attack compromise privacy?
Ответ: By sending small crypto amounts to analyze wallet activity

Question 2 of 2
What’s the purpose of the “dust” in a dusting attack?
Ответ: To trace transactions and link addresses

(Таск SpunkySDX | Revolutionizing Commerce with Blockchain and AI)
Question 1 of 3
What does SpunkySDX use to monitor stolen assets?
Ответ: AI algorithms

Question 2 of 3
What is the APY available for staking SSDX tokens?
Ответ: 5%

Question 3 of 3
In addition an audit, what other transparency measures has SpunkySDX taken?
Ответ: KYC Badge

(Таск Exploring PSBT in Bitcoin DeFi Ecosystem)
Question 1 of 3
What does PSBT standardize in Bitcoin transactions?
Ответ: Creation, sharing, and signing of transactions

Question 2 of 3
Which flag provides the highest transaction integrity in PSBT?
Ответ: SIGHASH_ALL

Question 3 of 3
PSBT can be finalized without all signatures.
Ответ: False

(Таск Ice Open Network | A Blueprint for a New Internet)
Question 1 of 2
What does Ice Open Network’s KYC Gold Badge signify?
Ответ: The team’s identities have been verified for transparency and trust

Question 2 of 2
What is the primary vision of Ice Open Network?
Ответ: To onboard 5.5 billion internet users onto blockchain technology

(Таск The Scam Contract Behind Transaction Simulation Spoofing)
Question 1 of 2
How did the scammer’s contract trick the simulator?
Ответ: By altering contract state after the simulation

Question 2 of 2
What is one key tool you can use to identify risky contracts?
Ответ: CertiK’s Token Scan

(Таск Transaction Simulation Spoofing – How It Happens and How to Prevent It)
Question 1 of 2
What do transaction simulators rely on to generate previews?
Отве: Current blockchain state at initialization

Question 2 of 2
What is a critical step to prevent spoofing when using unfamiliar dApps?
Ответ: Verify the legitimacy of the dApp or website

(Таск Protecting Your Crypto in 2025)
Question 1 of 3
What is a common phishing tactic used in Web3?
Ответ: Creating fake dApps to trick users into connecting their wallets

Question 2 of 3
Which tool can be used to verify smart contract legitimacy?
Ответ: Etherscan

Question 3 of 3
Why are cold wallets safer than hot wallets?
Ответ: They store private keys offline, making them inaccessible to remote hacker

(Таск Understanding Uniswap V4 Hooks and Their Security Implications)
Question 1 of 3
What is the main function of Uniswap V4 hooks?
Ответ: To allow custom logic to be added before and after liquidity events

Question 2 of 3
Which of the following is a major security risk with Uniswap V4 hooks?
Ответ: Poorly implemented hooks can lead to permission mismatches and exploits

Question 3 of 3
What is a key step to securing a Uniswap V4 hook contract?
Ответ: Implementing strict access control to prevent unauthorized function calls

(Таск E Money Network | The World's First BankFi Network)
Question 1 of 3
What is a key benefit of E Money Cards?
Ответ: "The ability to spend crypto like cash at millions of locations" Question 2 of 3
What does MiCA compliance ensure?
Ответ: Regulatory adherence and trust

Question 3 of 3
What is a key feature of E Money Wallet?
Ответ: Real-time FX conversion for seamless management

(Таск Portkey Wallet | A secure and easy gateway to Web3)
Question 1 of 3
Which feature enables Portkey to verify your identity without revealing personal data?
Ответ: Zero-Knowledge Proofs (ZKPs) through zkLogin

Question 2 of 3
How does Portkey remove the need for storing private keys?
Ответ: It uses manager addresses stored on user devices

Question 3 of 3
What makes Portkey’s Virtual Address (VA) different from ERC-4337 wallets on Ethereum?
Ответ: VA eliminates the need for individual contract deployment

(Таск Cryptocurrency and IoT Security - How Smart Devices Can Be Hacked)
Question 1 of 4
What makes IoT devices a security risk for crypto users?
Ответ: Many lack strong security protections.

Question 2 of 4
How can hackers use smart assistants (Alexa, Siri) to steal crypto?
Ответ: By tricking them into sending sensitive information.

Question 3 of 4
What is the safest way to store cryptocurrency?
Ответ: On a hardware wallet.

Question 4 of 4
What should you do to protect your crypto wallet from IoT hacks?
Ответ: Keep your crypto devices on a separate network from IoT devices.

(Таск Crypto and AI: Can Artificial Intelligence Protect or Steal Your Crypto?)
Question 1 of 4
Which of the following is a risk associated with AI in crypto security?
Ответ: AI-generated deepfake videos can be used to impersonate crypto influencers.

Question 2 of 4
How do AI-powered malware programs steal crypto?
Ответ: By tracking keystrokes and replacing copied wallet addresses

Question 3 of 4
What is one way hackers use AI for phishing scams?
Ответ: AI writes highly convincing fake emails and messages.

Question 4 of 4
How can you protect yourself from AI-powered scams?
Ответ: Always double-check messages from crypto exchanges.

(Таск The Psychology of Crypto Scams: Why Do People Keep Falling for Them?)
Question 1 of 4
What is a key reason why people fall for crypto scams?
Ответ: Scammers exploit emotions like fear and greed.

Question 2 of 4
Which of the following is a sign of a potential scam?
Ответ: A limited-time investment opportunity that requires fast action.

Question 3 of 4
How do scammers create trust in their schemes?
Ответ: They use fake testimonials and endorsements.

Question 4 of 4
What should you do if you receive an email saying your wallet is compromised?
Ответ: Check the official wallet provider’s website and support channels.

(Таск Comparing Solana and Ethereum Transaction Processing Models)
Question 1 of 4
What key feature distinguishes Solana's transaction processing model from Ethereum's?
Ответ: Use of Proof-of-History (PoH) and parallel processing

Question 2 of 4
Ethereum’s transaction model is known for being:
Ответ: Sequential and limited by gas fees


Question 3 of 4
Which vulnerability is more likely on Ethereum due to its sequential processing?
Ответ: Front-running attacks

Question 4 of 4
What is one recommended best practice for mitigating security risks on these networks?
Ответ: Regularly auditing smart contracts and staying updated on network security improvements

(Таск Baby Neiro | The Next-Gen Meme Token Revolution)
Question 1 of 3
What is the primary goal of Baby Neiro as a meme token?
Ответ: To unite the meme community and honor Doge’s influence

Question 2 of 3
What is Baby Neiro’s total token supply?
Ответ: 420,000,000,000,000,000

Question 3 of 3
How does Baby Neiro prioritize security?
Ответ: By undergoing a CertiK security audit and obtaining a Team Verification badge

(Таск Haven1 | Safehaven EVM Blockchain)
Question 1 of 3
Which feature ensures user accountability on Haven1?
Ответ: hPassport NFT

Question 2 of 3
Under which consensus model does Haven1 operate?
Ответ: Proof-of-Authority (PoA)

Question 3 of 3
What helps maintain consistently deep and reliable liquidity on Haven1?
Ответ: AI-powered incentive adjustments