GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 321–340 of 1387 questions
technology hard mcq

Which Zero Trust principle requires continuous verification of trust assumptions?

  1. Never Trust, Always Verify
  2. Assume Breach
  3. Least Privilege Access
  4. All of these
technology hard mcq

Which database design pattern stores historical changes to data by adding new rows instead of updating existing ones?

  1. Soft Delete
  2. Temporal Tables
  3. Event Sourcing
  4. Both B and C
technology hard true_false

Zero Trust Architecture assumes that threats can exist both outside and inside the traditional network perimeter.

  1. True
  2. False
technology hard fill_blank

The cloud architecture pattern where applications are built as loosely coupled, independently deployable services is called ________ Architecture.

technology hard mcq

Which database isolation level prevents dirty reads but allows non-repeatable reads and phantom reads?

  1. Read Uncommitted
  2. Read Committed
  3. Repeatable Read
  4. Serializable
technology hard mcq

Which ISRO mission demonstrated in-orbit servicing capability by refueling a satellite?

  1. SPADEX
  2. POEM
  3. DS-SAR
  4. Not yet demonstrated
technology hard true_false

Homomorphic encryption allows computations on encrypted data without decrypting it first.

  1. True
  2. False
technology hard fill_blank

The framework that enables consent-based sharing of financial data between institutions in India is called the ________ Framework.

technology hard mcq

Which type of ransomware encrypts files and also exfiltrates data to threaten public release if ransom is not paid?

  1. Crypto-ransomware
  2. Locker ransomware
  3. Double extortion ransomware
  4. Scareware