CertiK Skynet Quiz Answer — Web3 Security

bara | Web3 Explorer
7 min readMay 24, 2024

--

Join : https://skynet.certik.com/quest/signup?referralId=6eadcf7c-b93d-4d2a-9dba-d51f05ae809b

PART 2 : Web3 Security

Quiz : Choosing a Secure Exchange
Link : https://skynet.certik.com/quest/choosing-a-secure-exchange?referralId=7495204328499890057
Answer 1 : All of the above
Answer 2 : True

Quiz : Proof of Reserve
Link : https://skynet.certik.com/quest/proof-of-reserve?referralId=9272102457101608009
Answer 1 : False
Answer 2 : All of the above

Quiz : Recognizing Risk Signals on the Exchange
Link : https://skynet.certik.com/quest/recognizing-risk-signals-on-the-exchange?referralId=6106406286272772335
Answer 1 : They might be recommending a scam or fraudulent scheme
Answer 2 : The exchange has liquidity problems or internal issues

Quiz : Important Exchange Security Features
Link : https://skynet.certik.com/quest/important-exchange-security-features?referralId=6897743086596209962
Answer 1 : The exchange has strong information security management systems
Answer 2 : It minimizes the risks associated with using a cryptocurrency exchange

Quiz : Private Key Security
Link : https://skynet.certik.com/quest/private-key-security?referralId=17187179746354044092
Answer 1 : If someone gains access to your private key, they gain access to your crypto assets
Answer 2 : Store it offline, preferably in a hardware wallet

Quiz : Private Key Security: Seed Phrases
Link : https://skynet.certik.com/quest/private-key-security-seed-phrases?referralId=1040138999420727385
Answer 1 : Create a backup and store it in secure locations
Answer 2 : It can be hacked or accessed by unauthorized parties

Quiz : Losses Related to Private Key Compromises
Link : https://skynet.certik.com/quest/losses-related-to-private-key-compromises?referralId=9408031587520720781
Answer 1 : Nearly $881 million across 47 incidents
Answer 2 : Binance

Quiz : Website & dApp Security
Link : https://skynet.certik.com/quest/website-and-dapp-security?referralId=4150331639322710277
Answer 1 : False
Answer 2 : The dApp has limited documentation and transparency

Quiz : Identifying Malicious Activity on Websites & dApps
Link : https://skynet.certik.com/quest/identifying-malicious-activity-on-websites-and-dapps?referralId=533715484262572063
Answer 1 : Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking
Answer 2 : The URL has subtle differences from the legitimate site, like extra characters or misspellings

Quiz : Stay Vigilant on Browser Plugins
Link : https://skynet.certik.com/quest/stay-vigilant-on-browser-plugins?referralId=9457800978739544889
Answer 1 : Using plugins promoted by users on social platforms
Answer 2 :Mimicking legitimate projects with similar functionality, Sending unsolicited messages on social platforms, Exploiting or taking over third-party plugins

Quiz : Common Web3 Phishing Methods
Link : https://skynet.certik.com/quest/common-web3-phishing-methods?referralId=11492416281802115881
Answer 1 : True
Answer 2 : False

Quiz : Intro to Airdrop Scams
Link : https://skynet.certik.com/quest/intro-to-airdrop-scams?referralId=8106387720009340007
Answer 1 : False
Answer 2 : Requires software downloads from unverified sources, Come via unsolicited messages on social media, Website domain does not match the official site

Quiz : Identifying and Avoiding Phishing Scams in X Replies
Link : https://skynet.certik.com/quest/identifying-and-avoiding-phishing-scams-in-x-replies?referralId=875620538694107248
Answer 1 : Display names on X can be misused to impersonate official accounts, Scammers may disguise themselves using Gold Check accounts on X
Answer 2 : Same display name as the official account, A very similar username, Same account profile picture
Answer 3 : Users could always trust messages prior to the End of Thread

Quiz : Importance of Bug Bounty Programs in Web3
Link : https://skynet.certik.com/quest/importance-of-bug-bounty-programs-in-web3?referralId=11398255591843639352
Answer 1 : True
Answer 2 : Use open source expertise for security
Answer 3 : Massa, Wemix, Tonstakers, Edu3Labs

Quiz : Evaluating Cryptocurrency News Sources
Link : https://skynet.certik.com/quest/evaluating-cryptocurrency-news-sources?referralId=7083876707453900942
Answer 1 : True
Answer 2 : Choose all answer

Quiz : Intro to Crypto Drainers
Link : https://skynet.certik.com/quest/evaluating-cryptocurrency-news-sources?referralId=7083876707453900942
Answer 1 : All of the above
Answer 2 : True

Quiz : SIM Swap Attacks
Link : https://skynet.certik.com/quest/sim-swap-attacks?referralId=2351809068522554021
Answer 1 : Searching the dark web to find your previously leaked information, Browsing through your public social media accounts.
Answer 2 : Use authentication apps like Okta or Authy.

Quiz : Protecting Yourself from Discord Scams
Link : https://skynet.certik.com/quest/protecting-yourself-from-discord-scams?referralId=993527816273655664
Answer 1 : Posting fake offers for free mints or airdrops to exploit FOMO (Fear Of Missing Out)
Answer 2 : Reset your password as soon as possible and ensure 2FA is enabled

Quiz : Hackers Infiltrating Crypto Job Boards
Link : https://skynet.certik.com/quest/hackers-infiltrating-crypto-job-boards?referralId=5382846642302486834
Answer 1 : $600 million
Answer 2 : 4,000
Answer 3 : Refusing to turn on the camera

Quiz : Setting Up a Security War Room
Link : https://skynet.certik.com/quest/setting-up-a-security-war-room?referralId=3315115275179653697
Answer 1 : Secure messaging apps
Answer 2 : They identify weaknesses and improve team coordination
Answer 3 : All of the above

Quiz : What Is a Keylogger?
Link : https://skynet.certik.com/quest/what-is-a-keylogger?referralId=2904589360153093740
Answer 1 : Regularly check USB ports for unfamiliar devices
Answer 2 : Stealing sensitive information

Quiz : Understanding and Preventing Sybil Attacks
Link : https://skynet.certik.com/quest/understanding-and-preventing-sybil-attacks?referralId=15644404956074897082
Answer 1 : An attack where one person creates multiple identities to take over a network.
Answer 2 : All of the above.
Answer 3 : By making it impractical and costly for attackers to succeed.

Quiz : Cold Wallets
Link : https://skynet.certik.com/quest/cold-wallets?referralId=11445177701555739585
Answer 1 : Storing your crypto assets offline for safe and long-term storage
Answer 2 : Paper Wallet, Hardware Wallet, Offline Software Wallet
Answer 3 : Always purchase a wallet directly from the manufacturer, Check on hardware wallet’s security features

Quiz : How to Create and Maintain Secure Passwords
Link : https://skynet.certik.com/quest/how-to-create-and-maintain-secure-passwords?referralId=5899894381473718979
Answer 1 : To prevent hackers from accessing multiple accounts
Answer 2 : A mix of upper and lower case letters, numbers, and special characters
Answer 3 : Regularly to prevent expired passwords from being useful to hackers

Quiz : Understanding and Mitigating 51% Attacks
Link : https://skynet.certik.com/quest/understanding-and-mitigating-51-attacks?referralId=14281381568210059389
Answer 1 : An attacker gains control of more than half of the network’s computational power
Answer 2 : Double-spending of coins
Answer 3 : By distributing mining power widely and adjusting mining difficulty

Quiz : Protecting Your PostgreSQL Database from Cryptojacking
Link : https://skynet.certik.com/quest/protecting-your-postgresql-database-from-cryptojacking?referralId=8337860010280137196
Answer 1 : False
Answer 2 : Creates a new user account with high privileges
Answer 3 : Using strong, unique passwords and regular system updates

Quiz : SOC 2 Compliance for Crypto Companies
Link : https://skynet.certik.com/quest/soc-2-compliance-for-crypto-companies?referralId=17967402444805372117
Answer 1 : False
Answer 2 : Security, Availability, Processing Integrity, Confidentiality, and Privacy
Answer 3 : It helps demonstrate a commitment to data security and builds trust with user

Quiz : Understanding Soft Rug vs. Hard Rug Pulls
Link : https://skynet.certik.com/quest/understanding-soft-rug-vs-hard-rug-pulls?referralId=8106667519799731356
Answer 1 : Developers abandoning and removing liquidity, leaving investors with worthless tokens
Answer 2 : Gradual selling of tokens by the development team

Quiz : Case Study on Enhancing Security for App Chains
Link : https://skynet.certik.com/quest/case-study-on-enhancing-security-for-app-chains?referralId=968417141694896528
Answer 1 : All subsequent transactions failed while nodes appeared operational
Answer 2 : Limiting the total number of functions within a contract

Quiz : DEXTools | Real-Time Trading Insights
Link : https://skynet.certik.com/quest/dextools-real-time-trading-insights?referralId=13397854886777927850
Answer 1 : To provide real-time analytics and insights for decentralized exchanges
Answer 2 : Trending 24-Hour Charts
Answer 3 : Reduced fees, access to premium features, and participation in governance

Quiz : Understanding Economic Exploits and Tokenomics
Link : https://skynet.certik.com/quest/understanding-economic-exploits-and-tokenomics?referralId=7545425048196864275
Answer 1 : Manipulating financial mechanisms for profit
Answer 2 : It influences decentralization and market stability
Answer 3 : They prevent token supply from being immediately flooded

Quiz : Intro to AML and its Role in Crypto
Link : https://skynet.certik.com/quest/intro-to-aml-and-its-role-in-crypto?referralId=13940675001291209963
Answer 1 : Placement
Answer 2 : To verify users’ identities
Answer 3 : It’s hard to trace transactions

Quiz : Secure Use of Exchanges
Link : https://skynet.certik.com/quest/secure-use-of-exchanges?referralId=2048262480080530805
Answer 1 : Two-Factor Authentication (2FA)
Answer 2 : It stores your cryptocurrency offline, providing better security
Answer 3 : Receiving an unsolicited email with a link to reset your password

Quiz : Understanding the Peel Chain Technique
Link : https://skynet.certik.com/quest/understanding-the-peel-chain-technique?referralId=6005194246799573729
Answer 1 : A laundering technique dividing a large amount into small transactions
Answer 2 : To hide funds through a series of small transactions

Quiz : Navigating NFT Security and Avoiding Scams
Link : https://skynet.certik.com/quest/navigating-nft-security-and-avoiding-scams?referralId=1465692649625084181
Answer 1 : By checking the creator’s profile and NFT metadata.
Answer 2 : In a hardware wallet that supports NFTs.
Answer 3 : Enabling two-factor authentication on accounts.

Quiz : Exploring Etherscan
Link : https://skynet.certik.com/quest/exploring-etherscan?referralId=2324715621298784014
Answer 1 : A search engine for Ethereum’s blockchain data
Answer 2 : Transaction history, token balances, and NFTs
Answer 3 : True

Quiz : Protecting Against Social Engineering Attacks
Link : https://skynet.certik.com/quest/protecting-against-social-engineering-attacks?referralId=15398309665054797205
Answer 1 : Tricks aimed at specific individuals to steal sensitive information.
Answer 2 : An email with urgent requests for confidential information.
Answer 3 : Verify the request using a trusted method.

Quiz : Understanding Chain Hopping and Crypto Money Laundering
Link : https://skynet.certik.com/quest/understanding-chain-hopping-and-crypto-money-laundering?referralId=14103081932993989790
Answer 1 : By pooling and redistributing cryptocurrencies among multiple users
Answer 2 : False

Quiz : How the DHS is Stopping Ransomware Attacks
Link : https://skynet.certik.com/quest/how-the-dhs-is-stopping-ransomware-attacks?referralId=16354847182516102643
Answer 1 : A type of malware that locks data and demands payment to unlock it.
Answer 2 : 537
Answer 3 : Gathering evidence to prosecute hackers.

Quiz : Identifying Crypto Market Manipulation
Link : https://skynet.certik.com/quest/identifying-crypto-market-manipulation?referralId=6820881557056238372
Answer 1 : To create fake trading activity
Answer 2 : Tokens are artificially inflated and then sold off

Quiz : What is DePIN?
Link : https://skynet.certik.com/quest/what-is-depin?referralId=6475212405630348304
Answer 1 : Decentralized Physical Infrastructure Network
Answer 2 : Filecoin

Quiz : About Satoshi Nakamoto
Link : https://skynet.certik.com/quest/about-satoshi-nakamoto?referralId=9997838490157918669
Answer 1 : 2008
Answer 2 : 2011
Answer 3 : 1 million BTC

Quiz : Exploring the Security Model for Optimism’s Superchain
Link : https://skynet.certik.com/quest/exploring-the-security-model-for-optimisms-superchain?referralId=15081510943664966181
Answer 1 : A Layer 2 scaling solution for Ethereum
Answer 2 : By posting transaction data to Ethereum
Answer 3 : Fraud proofs

Quiz : Defending Against Clipper Malware
Link : https://skynet.certik.com/quest/defending-against-clipper-malware?referralId=18370010812788622234
Answer 1 : Replaces copied crypto wallet addresses with hacker-controlled addresses
Answer 2 : Messaging apps like WhatsApp and Telegram
Answer 3 : Verify wallet addresses before sending funds

Quiz : Radiant Capital’s $50M DeFi Hack Response
Link : https://skynet.certik.com/quest/radiant-capitals-usd50m-defi-hack-response?referralId=9010143129749080954
Answer 1 : By compromising developer hardware wallets with malware
Answer 2 : Reduced signers to seven, with four required for approval
Answer 3 : 72 hours

Join my telegram channel for more!
https://t.me/airdropperpub

--

--

Responses (3)