Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Both A and B
STIX/TAXII standardizes threat data exchange; MITRE ATT&CK catalogs adversary TTPs. Both enable threat-informed defense and collaboration.
Answer: True
Cloud Security Posture Management automates detection/remediation of misconfigurations: public storage, weak IAM, unencrypted resources.
Answer: Shared Responsibility Model
Cloud provider secures infrastructure ('security OF cloud'); customer secures data/apps ('security IN cloud'). Responsibilities vary by service model (IaaS/PaaS/SaaS).
Answer: Privilege
Principle of Least Privilege restricts user/system access rights to only what is essential. Reduces attack surface and limits damage from compromised accounts.
Answer: True
Micro-segmentation creates granular security zones around workloads, containing breaches and limiting attacker movement. Critical for Zero Trust implementation.
Answer: Never Trust, Always Verify
Zero Trust assumes breach and verifies every request regardless of source. Implements identity verification, least privilege, micro-segmentation, continuous monitoring.
Answer: All of these
India's digital education ecosystem integrates: DigiLocker (store/share certificates), Academic Bank of Credits (ABC) for credit accumulation/transfer under NEP 2020, and NDEAR (National Digital Education Architecture) for interoperable standards. Blockchain pilots ensure tamper-proof credential verification. Supports lifelong learning and student mobility.
Answer: False
INNER JOIN returns only matching rows. OUTER JOIN (LEFT/RIGHT/FULL) returns matching rows PLUS unmatched rows from one or both tables, with NULLs for missing side. LEFT JOIN: all left table rows; RIGHT JOIN: all right table rows; FULL OUTER: all rows from both. Essential for comprehensive data analysis and reporting.
Answer: Penetration
Penetration Testing (ethical hacking) involves authorized simulated cyberattacks to identify security weaknesses before malicious actors exploit them. Types: black-box (no prior knowledge), white-box (full knowledge), gray-box (partial). Conducted by certified professionals (CEH, OSCP). Findings guide remediation and strengthen security posture.
Answer: Scheduling
Scheduling (or start-stop automation) shuts down dev/test environments nights and weekends, reducing costs by 60-70%. Implemented via cloud provider tools (AWS Instance Scheduler, Azure Automation) or third-party solutions. Complements other strategies: right-sizing (match resources to workload), reserved instances (commitment discounts), and auto-scaling (demand-based scaling).
Answer: False
ABHA (Ayushman Bharat Health Account) number is voluntary and consent-based. Citizens can choose to create ABHA ID for convenient access to digital health records, but cannot be denied healthcare services for not having it. Aligns with Supreme Court privacy principles and DPDP Act requirements for voluntary consent in data processing.
Answer: Both B and C
Temporal Tables (SQL:2011 standard) automatically track row history with system-versioned tables. Event Sourcing stores state changes as immutable events, enabling reconstruction of any historical state. Both support audit trails, time-travel queries, and compliance. Trade-offs: increased storage and query complexity for historical analysis.
Answer: SSLV
SSLV (Small Satellite Launch Vehicle) is designed for launching mini/micro/nanosatellites (up to 500 kg to LEO) with low cost, minimal infrastructure, and quick turnaround. Features modular design, minimal launch preparations, and flexibility for multiple satellite deployments. Caters to growing global small satellite market and technology demonstrations.
Answer: All of these
Data localization requirements exist in: RBI directive (payment system data stored only in India), DPDP Act 2023 (significant data fiduciaries may be notified for localization), and sectoral guidelines (telecom, health). Balances data sovereignty, law enforcement access, and global data flow needs. Compliance requires careful architecture planning.
Answer: True
Cloud bursting allows organizations to maintain baseline capacity on-premises/private cloud and dynamically scale to public cloud during traffic spikes. Optimizes cost (pay for extra only when needed) while ensuring performance. Requires compatible infrastructure, orchestration tools, and data synchronization between environments.
Answer: MyGov
MyGov is a citizen engagement platform launched under Digital India. Enables Indians to participate in policy discussions, submit ideas, vote on proposals, and provide feedback on government initiatives. Fosters collaborative governance, transparent decision-making, and inclusive policy formulation through digital participation.
Answer: UNIQUE
UNIQUE constraint enforces that all values in a column (or column combination) are distinct across rows. Unlike PRIMARY KEY, UNIQUE allows NULL values (typically one NULL per column). Used for business keys like email, phone number. Multiple UNIQUE constraints can exist per table, aiding data integrity and query optimization.
Answer: CARTOSAT-3
CARTOSAT-3 is a third-generation agile advanced earth observation satellite with sub-meter resolution (0.25m panchromatic). Used for cartography, urban planning, infrastructure monitoring, and strategic applications. Launch on PSLV in 2019. Part of India's self-reliance in high-resolution remote sensing data for development and security.
Answer: True
Zero Trust operates on 'never trust, always verify' principle. It eliminates implicit trust based on network location, requiring strict identity verification for every access request regardless of origin. Implements micro-segmentation, least-privilege access, continuous monitoring, and assumes breach mindset for robust security posture.
Answer: IaaS
IaaS (Infrastructure as a Service) provides fundamental computing resources: virtual machines, storage, networks, and operating systems. Customers manage applications, data, runtime, and middleware. Examples: AWS EC2, Azure VMs, Google Compute Engine. Offers maximum flexibility but requires more management than PaaS or SaaS.