Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Transformer
Transformer architecture uses self-attention mechanisms to process sequences in parallel, enabling scaling to billions of parameters.
Answer: Parquet
Parquet is columnar storage format optimized for analytics: efficient compression, predicate pushdown, schema evolution.
Answer: Stream
Stream processing handles continuous data flows for real-time insights: fraud detection, monitoring, personalization.
Answer: All of these
Kafka (messaging), Flink (stream processing), Spark Streaming (micro-batch) enable real-time analytics with varying consistency guarantees.
Answer: Hunting
Threat hunting uses hypotheses, analytics, and analyst expertise to find hidden adversaries. Complements automated detection.
Answer: True
IOCs are forensic artifacts indicating potential breaches. Used for proactive blocking, hunting, and incident response.
Answer: Both A and B
STIX/TAXII standardizes threat data exchange; MITRE ATT&CK catalogs adversary TTPs. Both enable threat-informed defense and collaboration.
Answer: True
Cloud Security Posture Management automates detection/remediation of misconfigurations: public storage, weak IAM, unencrypted resources.
Answer: Shared Responsibility Model
Cloud provider secures infrastructure ('security OF cloud'); customer secures data/apps ('security IN cloud'). Responsibilities vary by service model (IaaS/PaaS/SaaS).
Answer: Privilege
Principle of Least Privilege restricts user/system access rights to only what is essential. Reduces attack surface and limits damage from compromised accounts.
Answer: True
Micro-segmentation creates granular security zones around workloads, containing breaches and limiting attacker movement. Critical for Zero Trust implementation.
Answer: Never Trust, Always Verify
Zero Trust assumes breach and verifies every request regardless of source. Implements identity verification, least privilege, micro-segmentation, continuous monitoring.
Answer: All of these
India's digital education ecosystem integrates: DigiLocker (store/share certificates), Academic Bank of Credits (ABC) for credit accumulation/transfer under NEP 2020, and NDEAR (National Digital Education Architecture) for interoperable standards. Blockchain pilots ensure tamper-proof credential verification. Supports lifelong learning and student mobility.
Answer: False
INNER JOIN returns only matching rows. OUTER JOIN (LEFT/RIGHT/FULL) returns matching rows PLUS unmatched rows from one or both tables, with NULLs for missing side. LEFT JOIN: all left table rows; RIGHT JOIN: all right table rows; FULL OUTER: all rows from both. Essential for comprehensive data analysis and reporting.
Answer: Penetration
Penetration Testing (ethical hacking) involves authorized simulated cyberattacks to identify security weaknesses before malicious actors exploit them. Types: black-box (no prior knowledge), white-box (full knowledge), gray-box (partial). Conducted by certified professionals (CEH, OSCP). Findings guide remediation and strengthen security posture.
Answer: Scheduling
Scheduling (or start-stop automation) shuts down dev/test environments nights and weekends, reducing costs by 60-70%. Implemented via cloud provider tools (AWS Instance Scheduler, Azure Automation) or third-party solutions. Complements other strategies: right-sizing (match resources to workload), reserved instances (commitment discounts), and auto-scaling (demand-based scaling).
Answer: False
ABHA (Ayushman Bharat Health Account) number is voluntary and consent-based. Citizens can choose to create ABHA ID for convenient access to digital health records, but cannot be denied healthcare services for not having it. Aligns with Supreme Court privacy principles and DPDP Act requirements for voluntary consent in data processing.
Answer: Both B and C
Temporal Tables (SQL:2011 standard) automatically track row history with system-versioned tables. Event Sourcing stores state changes as immutable events, enabling reconstruction of any historical state. Both support audit trails, time-travel queries, and compliance. Trade-offs: increased storage and query complexity for historical analysis.
Answer: SSLV
SSLV (Small Satellite Launch Vehicle) is designed for launching mini/micro/nanosatellites (up to 500 kg to LEO) with low cost, minimal infrastructure, and quick turnaround. Features modular design, minimal launch preparations, and flexibility for multiple satellite deployments. Caters to growing global small satellite market and technology demonstrations.
Answer: All of these
Data localization requirements exist in: RBI directive (payment system data stored only in India), DPDP Act 2023 (significant data fiduciaries may be notified for localization), and sectoral guidelines (telecom, health). Balances data sovereignty, law enforcement access, and global data flow needs. Compliance requires careful architecture planning.