Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: UEBA
UEBA (User and Entity Behavior Analytics) uses ML to establish behavioral baselines and detect anomalies indicating compromised accounts or insider threats. Critical for identity security.
Answer: True
Model registries (MLflow, SageMaker) manage model versions, parameters, metrics, and deployment history. Enables auditability, reproducibility, and rollback. Critical for enterprise MLOps.
Answer: Both A and B
ML security testing: adversarial examples test robustness, penetration testing finds implementation flaws. Critical for secure AI deployment in sensitive domains.
Answer: Multimodal Learning
Multimodal models (CLIP, LLaVA) process text, images, audio jointly, enabling visual question answering, image captioning, and cross-modal retrieval. Critical for next-gen AI applications.
Answer: True
Knowledge distillation trains compact models to mimic large teacher outputs, enabling efficient deployment on edge devices with minimal accuracy loss. Critical for scalable AI systems.
Answer: Both A and B
Code LLMs (Codex, CodeLlama) trained on code corpora enable natural language to code generation. Program synthesis automates code creation from specifications. Critical for developer productivity tools.
Answer: True
DPDP Act governs processing of digital personal data: (1) within India, and (2) outside India if offering goods/services or profiling individuals in India. Aligns with GDPR's extraterritorial scope.
Answer: TRAI
Telecom Regulatory Authority of India (TRAI) recommends policies, regulates tariffs, ensures QoS, and manages spectrum auctions. Critical for telecom sector governance questions.
Answer: Semiconductor
India Semiconductor Mission implements ₹76,000 crore incentive scheme for fabs, display fabs, ATMP, design. Partnerships with global players announced. Critical for tech sovereignty questions.
Answer: All of these
High-cardinality handling: one-hot for low cardinality, target encoding for medium, embeddings for high (deep learning). Choice depends on model type and cardinality. Critical for feature preprocessing.
Answer: True
Feature engineering: domain knowledge, transformations, interactions, encoding. Often more impactful than algorithm selection. Critical for successful machine learning projects.
Answer: ROC-AUC
ROC-AUC (Receiver Operating Characteristic - Area Under Curve) measures classifier performance across all thresholds, robust to class imbalance. Critical for evaluating binary classification models.
Answer: Ensemble
Ensemble methods (bagging, boosting, stacking) combine weak learners to reduce variance, bias, or improve predictions. Random Forests and Gradient Boosting are widely used ensemble techniques.
Answer: Multi-Site Active-Active
Active-active runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Highest cost but maximum resilience. Critical for mission-critical systems.
Answer: True
Service mesh (Istio, Linkerd) deploys sidecar proxies for mTLS, retries, metrics, tracing. Decouples infrastructure concerns from application code. Critical for cloud-native architectures.
Answer: Both A and B
Auto-scaling adjusts resource count based on CPU, memory, or custom metrics; load balancing distributes traffic across instances. Combined for elastic, resilient cloud applications.
Answer: Response
Incident response follows structured phases: preparation, detection, containment, eradication, recovery, lessons learned. Critical for minimizing breach impact and improving defenses.
Answer: Both A and B
Vulnerability scanners (Nessus, Qualys, OpenVAS) identify security weaknesses, prioritize by risk, and track remediation. Critical for proactive security posture management.
Answer: True
Canary deployment minimizes risk by gradually expanding model exposure, monitoring metrics, and rolling back if issues arise. Critical for safe ML system updates in production.
Answer: Both A and B
Data drift: input feature distribution changes; concept drift: relationship between features and target changes. Monitoring both enables timely model retraining. Critical for production ML reliability.