Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
Adversarial defenses: adversarial training includes perturbed examples, defensive distillation smooths outputs, randomized smoothing adds noise. All improve robustness against adversarial attacks.
Answer: All of these
Zero Trust combines: never trust always verify (continuous authentication), assume breach (detect/contain threats), least privilege (minimum access). All principles work together for comprehensive security.
Answer: Transformer
Transformer uses self-attention for parallel sequence processing.
Answer: RAG
Retrieval-Augmented Generation combines LLMs with external knowledge retrieval.
Answer: Model / Pipeline
Model parallelism splits model layers across devices; pipeline parallelism stages computation. Critical for scaling LLM training.
Answer: Transformer
Transformer architecture uses self-attention mechanisms to process sequences in parallel, enabling scaling to billions of parameters.
Answer: Both B and C
Temporal Tables (SQL:2011 standard) automatically track row history with system-versioned tables. Event Sourcing stores state changes as immutable events, enabling reconstruction of any historical state. Both support audit trails, time-travel queries, and compliance. Trade-offs: increased storage and query complexity for historical analysis.
Answer: True
Zero Trust operates on 'never trust, always verify' principle. It eliminates implicit trust based on network location, requiring strict identity verification for every access request regardless of origin. Implements micro-segmentation, least-privilege access, continuous monitoring, and assumes breach mindset for robust security posture.
Answer: Microservices
Microservices Architecture decomposes applications into small, independent services communicating via APIs. Benefits: independent scaling, technology diversity, fault isolation, and faster deployments. Challenges: distributed system complexity, data consistency, monitoring. Often combined with containers (Docker) and orchestration (Kubernetes) for cloud-native development.
Answer: Read Committed
Read Committed isolation level ensures transactions see only committed data (prevents dirty reads). However, same query in same transaction may return different results if other transactions modify data (non-repeatable reads) or add new rows (phantom reads). Default in PostgreSQL and Oracle; balances consistency and concurrency.
Answer: Not yet demonstrated
As of 2026, ISRO has not yet demonstrated in-orbit refueling. SPADEX (Space Docking Experiment) tested docking/undocking, a prerequisite for servicing. POEM (PSLV Orbital Experimental Module) demonstrated using spent rocket stage as orbital platform. In-orbit servicing remains a future goal for satellite life extension and space debris management.
Answer: True
Homomorphic encryption enables performing calculations on ciphertext, producing encrypted results that, when decrypted, match operations performed on plaintext. Critical for privacy-preserving cloud computing, secure voting, and confidential AI inference. Still computationally intensive but advancing with research and hardware acceleration.
Answer: Account Aggregator
Account Aggregator (AA) is a consent-based data sharing framework regulated by RBI. It allows individuals to securely share financial information (bank statements, investments, insurance) between Financial Information Providers (FIPs) and Financial Information Users (FIUs) for better credit access and personalized services.
Answer: Double extortion ransomware
Double extortion ransomware combines file encryption with data theft. Attackers threaten to publish sensitive data if ransom isn't paid, increasing pressure on victims. This evolved tactic makes backups insufficient as a sole defense. Prevention requires DLP, encryption, network segmentation, and incident response planning.
Answer: Ultra-Low Power
Neuromorphic chips achieve ultra-low power via event-driven, sparse computation.
Answer: Wetware
Wetware computing uses biological neurons for computation. Early research stage.
Answer: True
SPHINCS+ uses hash functions believed quantum-resistant. Trade-off: larger signatures.
Answer: Homomorphic
Homomorphic Encryption enables computation on ciphertext.
Answer: Both A and B
NIST IR 8259 and ETSI EN 303 645 provide IoT security baselines: secure boot, updates, data protection.
Answer: Impermanent Loss
Impermanent loss occurs when token prices diverge, reducing value vs holding tokens. Critical risk for liquidity providers.