Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Both A and B
Spiking neurons fire only when needed; event-driven processing handles only changes. Combined enable orders-of-magnitude better energy efficiency than GPUs for edge AI.
Answer: DNA / Molecular
DNA computing leverages biochemical reactions for parallel problem-solving. Research stage with potential for combinatorial optimization, cryptography, archival storage.
Answer: True
QEC codes (surface code, Shor code) protect quantum information from decoherence and noise. Critical for fault-tolerant quantum computing but requires significant qubit overhead.
Answer: Grover's Algorithm
Grover's Algorithm searches unsorted database of N items in O(√N) queries vs O(N) classically. Applications: optimization, cryptography, machine learning enhancement.
Answer: Differential
Differential Privacy mathematically guarantees query results don't reveal individual records. Used in census, health analytics, tech telemetry for privacy-preserving insights.
Answer: True
Accountability (GDPR Article 5, DPDP Act Section 8) requires documented policies, training, audits, and breach response procedures. Critical for regulatory compliance.
Answer: Both A and B
GDPR Article 35 and DPDP Act Section 10 require DPIAs for processing likely to result in high risk to individuals' rights. Critical for privacy-by-design compliance.
Answer: Differential
Differential Privacy adds mathematical noise to model outputs, providing provable privacy guarantees against membership inference and model inversion attacks.
Answer: True
Model extraction queries API to infer model architecture/parameters, enabling intellectual property theft or adversarial example generation. Mitigation: query rate limiting, output perturbation.
Answer: Backdoor Attack
Backdoor attacks inject malicious patterns during training that cause targeted misclassification when trigger present. Critical threat requiring robust training data validation.
Answer: Code
Security as Code defines policies in declarative format (OPA, Sentinel), enabling version control, testing, automated enforcement. Critical for scalable cloud security governance.
Answer: True
CWPP provides unified security for VMs, containers, serverless across AWS, Azure, GCP, on-premises. Critical for consistent security posture in hybrid cloud.
Answer: All of these
Comprehensive cloud security: IaC scanning (Terraform, CloudFormation), container image scanning, runtime protection (Falco, Tetragon). Combined for defense-in-depth.
Answer: Application-Layer
Application-layer encryption ensures data remains encrypted even if storage or network layers are compromised. Critical for end-to-end data protection in Zero Trust architectures.
Answer: True
Continuous authentication adjusts verification requirements based on behavioral analytics, device posture, location, and other risk signals. Critical for Zero Trust security posture.
Answer: Both A and B
Software-Defined Perimeter (SDP) creates identity-based perimeters; micro-segmentation isolates workloads. Both implement Zero Trust by limiting access to authenticated, authorized entities only.
Answer: Prompt
Instruction tuning fine-tunes LLMs on instruction datasets, improving task completion and helpfulness.
Answer: True
Stratified sampling maintains class proportions in train/test splits, critical for imbalanced classification.
Answer: Latency
CDNs distribute content to edge locations near users, reducing latency and origin load.
Answer: Middle
NEP 2020 emphasizes computational thinking, coding, AI exposure from Class 6 onwards.