Binance New Offchain Computing Course’s All Quiz Answer!

Course 1: The What, Why and How of TEE Coprocessors

Question: What is the definition of “offchain computing”?

Answer: Computation performed offchain, with results verified on-chain.

Question: How do we distinguish coprocessors from rollups?

Answer: Rollups are described as sandboxed and “blockchain-esque,” while coprocessors are compared to flexible VMs with attestations.

Question: Which of the following is listed as a component of a coprocessor’s general architecture?

Answer: Relay contracts

Question: What “missing piece” in data protection does Confidential Computing address that Traditional Encryption leaves vulnerable?

Answer: Data “In Use”

Question: What is the only primary “con” or disadvantage listed for TEE (Trusted Execution Environment) coprocessors?

Answer: Hardware vendor trust dependency

Question: What components are used to verify the TEE deployed AI’s response on-chain?

Answer: The “Oyster Signature” and the “Enclave Public Key”.

Question: “Centralization concerns” and “challenge periods” are cons for which technology?

Answer: Layer 2 scaling (rollups)

Question: What is the primary goal of remote attestations?

Answer: To verify that an attestation is valid, recent, and from a real enclave running a specific image.

Question: Which TEE type is characterized by having “no persistent storage, external networking, or interactive access”?

Answer: AWS Nitro Enclaves

Question: According to the project overview, what is the primary reason for using Marlin’s Oyster TEE coprocessors?

Answer: To host verifiable AI (Llama 3.2) because blockchains cannot run AI and traditional APIs cannot be trusted.

Course 2: Building Production-Ready Backends Using TEEs

Question: What is the primary networking challenge associated with AWS Nitro Enclaves, and how does Oyster solve it?

Answer: They only support vsock networking, so Oyster provides a simple IP interface to hide this complexity.

Question: What is the core architectural difference between the Nautilus “Root Server” and “Derive Server”?

Answer: The Root Server derives public keys (publicly), while the Derive Server derives private keys (inside the enclave).

Question: Which of the following is listed as a “con” of using Confidential Virtual Machines (CVMs)?

Answer: Upfront lease cost and longer cold start

Question: According to the document, which computing model is characterized as “ephemeral,” “stateless,” and “event-driven”?

Answer: Serverless Computing

Question: Which of the following is included in the checklist for verifying a decoded attestation document?

Answer: Verify that the certificate chain’s root is the AWS Nitro Enclaves Root certificate.

Question: What is the fundamental purpose of a Key Management System (KMS)?

Answer: The lifecycle management of cryptographic keys, including their generation, storage, distribution, and rotation.

Question: Which of the following is listed as a key property of persistent storage in a TEE?

Answer: Data persists across the enclave lifecycle and is cryptographically protected.

Question: Which of the following is not a characteristic of “Contract-Based Persistent Storage”?

Answer: It is a simple but rigid approach where the same code results in the same persistent keys.

Question: What is the “Key Concept” of reproducible builds as defined in the document?

Answer: Same source code + Same build environment = Identical binary output.

Question: What is the “gap” that Remote Attestation alone cannot solve, which reproducible builds address?

Answer: Remote attestation verifies the binary (EIF) is running, but it doesn’t prove what source code was used to create that binary.

Course 3: Applications

Question: What is the purpose of using npx pkg -t node18-alpine app.js in Step 2?

Answer: To create a self-contained binary that runs without installing Node.js inside the enclave.

Question: In Step 5, how is the deployed NodeJS server interacted with, and what is the expected response?

Answer: By running curl :4000, expecting “Hello from Oyster Enclave!”.

Question: How is the deployed Marlin Oyster serverless function linked to the EthRate.sol smart contract before deployment?

Answer: The transaction hash (codeHash) from the serverless deployment is added to the script/deploy/EthRate.ts file.

Question: What is the primary role of the Marlin Oyster CVM enclave in this ZK-proof application?

Answer: To secure the user’s private inputs (age, BMI) so they cannot be leaked.

Question: What is the primary security benefit of the decentralized frontend approach?

Answer: It ensures that only enclaves running authorized images can request certificates for the domain, preventing tampering.

Question: After fetching the subdomain, what happens during the 4–5 minute waiting period?

Answer: The enclave is updating the DNS records.

Question: In Step 3, what is the purpose of the flag “–init-params “.env:1:1:file:./.env””?

Answer: To pass the environment variables file into the enclave during deployment.

Question: How does a user interact with the deployed AI agent?

Answer: By running nc <Enclave_IP> 8080 and entering a prompt.

Question: What command is used to verify the enclave through remote attestation?

Answer: oyster-cvm verify –enclave-ip

Question: Where does the user go to deploy the minified JavaScript function for the Marlin Oyster Serverless service?

Answer: They navigate to https://hub.marlin.org/oyster/serverless-sandbox/

আরও পড়ূনঃ

Leave a Reply

Your email address will not be published. Required fields are marked *