GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 441–460 of 1387 questions
technology hard mcq

Which technique enables querying encrypted databases without decrypting the data?

  1. Searchable Encryption
  2. Homomorphic Encryption
  3. Tokenization
  4. Both A and B
technology hard mcq

Which CERT-In direction mandates reporting of cybersecurity incidents within 6 hours?

  1. Direction 12
  2. Direction 20
  3. Direction 44
  4. Direction 66
technology hard mcq

Which Web3 technology enables decentralized ownership and transfer of digital assets?

  1. Cloud Storage
  2. Blockchain/NFTs
  3. Centralized Databases
  4. APIs
technology hard mcq

Which standard defines decentralized identifiers (DIDs) for self-sovereign digital identity?

  1. OAuth 2.0
  2. W3C DID Specification
  3. SAML
  4. OpenID Connect
technology hard mcq

Which attack exploits race conditions in software to gain unauthorized privileges?

  1. Buffer Overflow
  2. Time-of-Check-Time-of-Use
  3. SQL Injection
  4. Cross-Site Scripting
technology hard mcq

Which attack exploits trust in SSL/TLS certificates to intercept encrypted communications?

  1. Man-in-the-Middle
  2. SSL Stripping
  3. Certificate Pinning Bypass
  4. All of these
technology hard mcq

Which metric measures the total energy a battery can deliver over its lifetime?

  1. Energy Density
  2. Power Density
  3. Cycle Life
  4. Lifetime Energy Throughput
technology hard mcq

Which pattern enables gradual rollout of new features to a subset of users for testing?

  1. Blue-Green Deployment
  2. Canary Release
  3. Feature Toggles
  4. A/B Testing
technology hard mcq

Which attack exploits speculative execution vulnerabilities in CPUs to leak sensitive data?

  1. Meltdown/Spectre
  2. Rowhammer
  3. BlueBorne
  4. Log4Shell
technology hard mcq

Which CERT-In direction mandates synchronization of IT system clocks with National Time Server?

  1. Direction 12
  2. Direction 20
  3. Direction 44
  4. Direction 66
technology hard true_false

Deception technology uses honeypots and decoys to detect and study attacker behavior.

  1. True
  2. False
technology hard mcq

Which data format is most efficient for columnar storage and analytics workloads?

  1. CSV
  2. JSON
  3. Parquet
  4. XML