Quiz: DeFi Foundations

Multiple Choice

1. Which of the following best describes the core thesis of DeFi?

a) Cryptocurrency should replace all government-issued currencies b) Financial services currently provided by intermediaries can be replaced by smart contracts on public blockchains c) Banks should adopt blockchain technology to improve their existing services d) All financial transactions should be anonymous and untraceable


2. What is composability in the context of DeFi?

a) The ability to combine different cryptocurrencies into a single portfolio b) The ability for any DeFi protocol to use any other protocol as a building block without permission c) The ability to write smart contracts in multiple programming languages d) The ability to run DeFi protocols on multiple blockchains simultaneously


3. Which of the following is a valid criticism of TVL as a metric?

a) TVL cannot be calculated because blockchain data is private b) TVL only measures Ethereum-based protocols c) TVL can be inflated through recursive deposits and double-counting across protocols d) TVL is calculated in Bitcoin, which makes comparisons to fiat currency impossible


4. A flash loan is unique to DeFi because:

a) It offers the lowest interest rates in any financial system b) It requires no identification or credit check from the borrower c) Atomic transaction execution guarantees repayment, eliminating default risk for the lender d) It can be used to borrow any amount of any asset from any protocol


5. In the DeFi stack, where does a DEX aggregator like 1inch belong?

a) Settlement layer b) Asset layer c) Protocol layer d) Aggregation layer


6. Which of the following is NOT one of the five pillars of the DeFi thesis as described in this chapter?

a) Permissionless access b) Anonymity c) Composability d) Programmable money


7. Why can't traditional financial institutions replicate DeFi's composability?

a) Traditional institutions lack the technical expertise b) Regulations explicitly prohibit composable financial products c) Each institution operates in its own proprietary system, and integrations require bilateral permission and custom implementation d) Traditional financial products are too complex to compose


8. What is Maximal Extractable Value (MEV)?

a) The maximum amount of value that can be locked in a single DeFi protocol b) Profit that block producers can extract by reordering, inserting, or censoring transactions c) The highest yield available across all DeFi lending protocols d) The total value of all governance tokens in a protocol's treasury


9. According to the chapter, what is the most honest assessment of DeFi's promise to "bank the unbanked"?

a) DeFi has already successfully banked hundreds of millions of previously unbanked people b) DeFi is primarily used by crypto-native speculators in developed countries, and the unbanked lack the prerequisites to access it c) DeFi cannot help the unbanked because it only works with cryptocurrency, not fiat money d) DeFi's fees are too high for anyone to use, including people in developed countries


10. Which of the following DeFi yield sources is most likely to be unsustainable?

a) Interest paid by borrowers on a lending protocol b) Trading fees earned by liquidity providers on a DEX c) Governance token rewards distributed to depositors during a liquidity mining campaign d) Flash loan fees earned by a lending protocol


True or False

11. DeFi protocols can be used by anyone with an Ethereum wallet, regardless of their identity, nationality, or credit history.

12. Total Value Locked (TVL) always increases when new users deposit funds into DeFi protocols and can only decrease when users withdraw.

13. Smart contract audits guarantee that a DeFi protocol is secure and free from exploitable vulnerabilities.

14. In DeFi lending, loans are typically overcollateralized — borrowers must deposit more value in collateral than they borrow.

15. A protocol that has admin keys allowing a small team to freeze user funds or modify contract parameters can accurately be described as fully decentralized.


Short Answer

16. Explain the difference between a centralized exchange's order book model and a DEX's Automated Market Maker (AMM) model. What are the advantages and disadvantages of each? (4-6 sentences)


17. A user claims: "DeFi is trustless — I don't need to trust anyone." Identify three things that a DeFi user still needs to trust, even when using a well-established protocol. (3-4 sentences)


18. Describe two ways that TVL can increase without any new capital entering the DeFi ecosystem. Explain why this makes TVL a misleading measure of DeFi growth. (3-4 sentences)


19. What is the oracle problem, and why does it partially undermine DeFi's "trustless" thesis? Give a specific example of how an oracle failure could harm DeFi users. (4-5 sentences)


20. Explain why DeFi composability creates systemic risk. Use a specific example involving at least two DeFi protocols to illustrate how a failure in one protocol can cascade to another. (4-5 sentences)


Answer Key

1. b) Financial services currently provided by intermediaries can be replaced by smart contracts on public blockchains. DeFi's thesis is specifically about replacing the functions of financial intermediaries with code.

2. b) The ability for any DeFi protocol to use any other protocol as a building block without permission. This is the "money legos" concept — protocols can interoperate because they share the same execution environment and token standards.

3. c) TVL can be inflated through recursive deposits and double-counting across protocols. When a receipt token (e.g., aETH from Aave) is deposited into another protocol, the same underlying economic value is counted in both protocols' TVL.

4. c) Atomic transaction execution guarantees repayment, eliminating default risk for the lender. Flash loans depend on the blockchain property that if any step in a transaction fails, the entire transaction reverts. This mechanism cannot exist in traditional finance where transactions are not atomic.

5. d) Aggregation layer. DEX aggregators sit above individual protocols and route transactions across multiple DEXs to find optimal execution.

6. b) Anonymity. The five pillars are permissionless access, transparency, composability, 24/7 operation, and programmable money. DeFi is pseudonymous (not anonymous), and anonymity is not one of the core thesis pillars.

7. c) Each institution operates in its own proprietary system, and integrations require bilateral permission and custom implementation. Traditional finance uses walled gardens; connecting two services requires negotiation, legal agreements, and custom API integration — and access can be revoked.

8. b) Profit that block producers can extract by reordering, inserting, or censoring transactions. MEV includes front-running, sandwich attacks, and other forms of transaction ordering manipulation.

9. b) DeFi is primarily used by crypto-native speculators in developed countries, and the unbanked lack the prerequisites to access it. While DeFi adoption is growing in developing countries, the current reality is that most users are already well-served by traditional finance.

10. c) Governance token rewards distributed to depositors during a liquidity mining campaign. Token incentives are funded by inflation of the governance token supply. When selling pressure from farmers exceeds organic demand, token price declines can make real returns negative.

11. True. DeFi protocols are permissionless by design — the smart contract processes all transactions identically regardless of user identity. However, users still need internet access, technical knowledge, and cryptocurrency holdings to interact with protocols.

12. False. TVL can increase purely from token price appreciation (if ETH doubles in price, ETH-denominated TVL doubles even with no new deposits). Conversely, TVL can decrease from price declines even if no users withdraw.

13. False. Audits are valuable but not sufficient guarantees. Many exploited protocols had been audited by reputable firms. The complexity of composable smart contract interactions makes comprehensive security verification extraordinarily difficult.

14. True. DeFi lending requires overcollateralization — to borrow $100, a user might need $150 in collateral. This eliminates the need for credit checks but limits DeFi lending's ability to serve credit needs that traditional lending addresses.

15. False. Admin keys, upgrade mechanisms, or emergency shutdown capabilities controlled by a small team represent genuine centralization, regardless of how the protocol is marketed. "Progressive decentralization" is common, but many protocols retain significant centralized control.

16. A centralized exchange uses an order book where buyers post bids and sellers post asks, with a matching engine pairing compatible orders. This requires professional market makers to provide liquidity and creates a barrier to listing new assets. A DEX's AMM uses a mathematical formula (often the constant product formula x * y = k) to determine prices based on the ratio of tokens in a pool. Anyone can provide liquidity by depositing tokens, and any token can be listed permissionlessly. The order book model generally offers tighter spreads and better price execution for large trades, while the AMM model offers permissionless access and broader token coverage at the cost of impermanent loss for liquidity providers and higher slippage for large trades.

17. Even on well-established DeFi protocols, users must trust that the smart contract code is free of exploitable bugs (most users cannot verify this themselves). They must trust that the oracle providing price data to the protocol is accurate and cannot be manipulated. They must also trust that the governance token holders will not pass a malicious proposal that modifies the protocol against users' interests, and that the frontend interface they are using has not been compromised to redirect their transactions.

18. TVL can increase purely from token price appreciation — if the price of ETH doubles, all ETH-denominated deposits double in dollar value without any new capital entering. TVL can also increase through recursive deposits: when a receipt token (like aETH from Aave) is deposited into a second protocol, the same economic value is counted in both protocols' TVL. These mechanisms mean that aggregate TVL growth does not necessarily indicate real capital inflows, making it a misleading measure of genuine DeFi adoption.

19. The oracle problem refers to the challenge of bringing external (off-chain) data onto a blockchain in a trustworthy manner. DeFi protocols need price data from oracles, but every oracle introduces a trust assumption — users must trust that the data source is accurate, timely, and resistant to manipulation. This partially undermines DeFi's "trustless" thesis because the system depends on an external input that cannot be verified purely through code. For example, if an oracle reports that ETH is worth $100 instead of $3,000 (due to manipulation or malfunction), a lending protocol might incorrectly liquidate billions of dollars in healthy positions, causing massive losses for borrowers who were not actually under-collateralized.

20. DeFi composability creates systemic risk because protocols depend on each other, and a failure in one can cascade through all protocols that interact with it. For example, if a major stablecoin like DAI (issued by MakerDAO) loses its peg to the dollar, every lending protocol that accepts DAI as collateral (such as Aave) faces potential bad debt, and every DEX pool containing DAI (such as Curve's 3pool) faces liquidity imbalances. Yield strategies that depend on DAI stability — such as deposits in Yearn vaults that hold Curve DAI pools — would face compounding losses. This interconnectedness means that composability, which enables rapid innovation, simultaneously creates fragility where localized failures can become systemic.