Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: in-the-loop
Human-in-the-loop (HITL) ensures human oversight of AI decisions, especially in high-stakes domains. Critical for accountability, error correction, and ethical compliance. Complements human-on-the-loop supervision.
Answer: Forum / Index
ITU Global Cybersecurity Index assesses national cybersecurity commitment; forums facilitate knowledge sharing. India ranks high in GCI. Critical for international cybersecurity questions.
Answer: SSH
SSH (Secure Shell) encrypts remote command execution and file transfer, replacing insecure Telnet. Critical for secure network administration.
Answer: Code / Policy as Code
Security as Code (Open Policy Agent, AWS Config Rules) defines policies in declarative code, enabling version control, testing, and automated enforcement. Critical for scalable security governance.
Answer: Adapter / Anti-Corruption Layer
Adapter/ACL patterns wrap external APIs, translating between internal models and external interfaces. Critical for maintainable integrations and testing.
Answer: Academic Bank of Credits / DigiLocker
ABC stores academic credits digitally; DigiLocker stores certificates. Both enable instant verification for admissions, jobs, reducing fraud.
Answer: Artificial Intelligence / GPAI
GPAI (founded 2020) brings together experts for responsible AI development: research, policy, best practices. India is founding member. Critical for international AI governance questions.
Answer: LLDP / CDP
LLDP (Link Layer Discovery Protocol, IEEE) and CDP (Cisco Discovery Protocol) enable devices to advertise identity/capabilities. Critical for network management and troubleshooting.
Answer: Automated / Self-Healing
Automated remediation uses policies and scripts to fix misconfigurations (e.g., close public ports) without manual intervention. Critical for scalable cloud security operations.
Answer: Publish-Subscribe / Message Queue
Pub-Sub uses brokers (Kafka, RabbitMQ) for asynchronous communication, enabling scalability and resilience. Critical for event-driven and microservices architectures.
Answer: BharatKosh / e-Payments
BharatKosh consolidates government payment gateways for fees, taxes, donations. Supports UPI, cards, netbanking. Critical for cashless governance and financial inclusion.
Answer: Telecommunication / ITU
ITU (UN agency) develops technical standards for telecom, spectrum allocation, and digital development. India actively participates in ITU standardization processes.
Answer: Diffie-Hellman
Diffie-Hellman enables two parties to establish shared secret over public channel, foundation for TLS, SSH. Critical for understanding cryptographic protocols in network security.
Answer: Security Monitoring / CNAPP
Cloud Security Monitoring (part of CNAPP - Cloud-Native Application Protection Platforms) uses AI/ML to detect threats, misconfigurations, and anomalies in real-time. Critical for proactive cloud defense.
Answer: Domain-Driven Design / DDD
DDD aligns software structure with business domains: entities, aggregates, bounded contexts. Improves maintainability and team autonomy. Critical for complex enterprise application design.
Answer: Modernisation Programme / DILRMP
DILRMP digitizes land records, integrates with Aadhaar, enables online mutation, and reduces disputes. Critical for property rights, credit access, and governance transparency.
Answer: Public Interest / Common Good
Digital Public Goods (UN definition) are open solutions addressing SDGs: health, education, finance. India contributes: MOSIP (identity), Sunbird (education), DIVOC (vaccination). Critical for global development questions.
Answer: P4 / Programmable
P4 (Programming Protocol-Independent Packet Processors) enables custom packet processing logic in switches/routers. Supports innovation in telemetry, security, and traffic engineering. Critical for next-gen network research questions.
Answer: End-to-End / Comprehensive
End-to-end encryption protects data throughout lifecycle: at rest (storage), in transit (network), in use (processing via confidential computing). Critical for data protection and compliance questions.
Answer: Responsibility Segregation / CQRS
CQRS separates read (query) and write (command) models, enabling independent scaling, optimization, and consistency models. Often combined with Event Sourcing. Critical for high-performance systems design.