PracticeTestGeeks home

Blockchain Developer FREE Blockchain Developer Blockchain Security and Vulnerabilities Questions and Answers

An attacker creates thousands of pseudonymous nodes on a peer-to-peer network to gain a disproportionately large influence.
By controlling a significant number of these fake identities, the attacker aims to out-vote honest participants or disrupt network operations.

Which type of attack does this scenario describe?

Select your answer