Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: P4 / Programmable
P4 (Programming Protocol-Independent Packet Processors) enables custom packet processing logic in switches/routers. Supports innovation in telemetry, security, and traffic engineering. Critical for next-gen network research questions.
Answer: Both A and B
Searchable Encryption enables keyword search on ciphertext; Homomorphic Encryption enables computation on encrypted data. Both preserve privacy while enabling functionality. Critical for confidential cloud computing questions.
Answer: SR-MPLS / SRv6
Segment Routing (SR-MPLS, SRv6) encodes path instructions in packet headers, enabling flexible traffic engineering without per-flow state. Critical for scalable, programmable networks. Important for advanced networking questions.
Answer: Homomorphic
Homomorphic Encryption enables processing ciphertext, producing encrypted results that decrypt to correct output. Critical for privacy-preserving cloud analytics, secure voting, and confidential AI. Still computationally intensive but advancing.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers to report cyber incidents within 6 hours, maintain logs for 180 days, and synchronize clocks with National Time Server. Critical for incident response compliance questions.
Answer: Blockchain/NFTs
Blockchain with NFTs (Non-Fungible Tokens) enables verifiable digital ownership, provenance tracking, and peer-to-peer transfers without intermediaries. Applications: art, gaming, identity, supply chain. Critical for understanding Web3 and digital economy questions.
Answer: W3C DID Specification
W3C DID Specification enables users to create/own identifiers without central authorities. DIDs resolve to DID Documents containing public keys and service endpoints. Foundation for portable, privacy-preserving identity in Web3 and metaverse. Critical for digital identity standards questions.
Answer: Time-of-Check-Time-of-Use
TOCTOU attacks exploit window between permission check and resource use, allowing privilege escalation or data corruption. Mitigation: atomic operations, locking, and careful design. Critical for secure coding and system security questions.
Answer: True
EUV lithography (ASML) enables single-patterning of sub-7nm features vs multi-patterning with DUV. Challenges: light source power, mask defects, resist sensitivity. Critical technology for leading-edge chips; India monitors for future capability development.
Answer: All of these
MITM attacks intercept communications; SSL stripping downgrades HTTPS to HTTP; certificate pinning bypass tricks apps into accepting fake certs. Defenses: HSTS, certificate transparency, pinning. Critical for understanding web security threats in banking/UPSC exams.
Answer: Smart / Responsive
Smart materials (piezoelectrics, shape-memory alloys, electrochromics) respond to stimuli: mechanical stress, temperature, electric/magnetic fields. Applications: sensors, actuators, adaptive structures. India researches at DRDO, IITs. Critical for advanced materials and IoT questions.
Answer: Lifetime Energy Throughput
Lifetime Energy Throughput = Nominal Capacity × Cycle Life × Depth of Discharge. Critical for comparing storage economics: high-throughput batteries (LFP, flow) suit frequent cycling; high-energy-density (NMC) suit weight-sensitive applications. Essential for energy storage planning questions.
Answer: Gate-All-Around / GAA
GAA (Gate-All-Around) transistors (MBCFET, Nanosheet) surround channel with gate on all sides, improving electrostatic control vs FinFET at sub-3nm nodes. Enables continued scaling per Moore's Law. Critical for understanding semiconductor innovation roadmap questions.
Answer: 3nm
As of 2026, 3nm process node is in high-volume production (TSMC, Samsung) for flagship mobile and HPC chips. 2nm is in risk production with GAA transistors. India's semiconductor mission targets mature nodes (28nm-65nm) initially for strategic autonomy. Critical for understanding tech competitiveness questions.
Answer: Classification
Data Classification categorizes data (Public, Internal, Confidential, Restricted) to apply appropriate security controls: encryption, access restrictions, retention policies. Foundation of data protection programs. Critical for compliance (DPDP, GDPR) and information security questions.
Answer: Canary Release
Canary Release deploys new version to small user subset (canary group), monitors metrics, and gradually expands if stable. Reduces risk vs big-bang releases. Implemented via service mesh, load balancers, or feature flags. Critical for safe deployment strategies.
Answer: Meltdown/Spectre
Meltdown/Spectre (2018) exploit CPU speculative execution and cache side-channels to read kernel memory or other processes' data. Mitigated via microcode updates, OS patches, and compiler fixes. Highlights hardware-level security challenges. Critical for system security questions.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers to synchronize ICT system clocks with NIC's National Time Server for accurate incident timeline correlation. Also mandates 6-hour incident reporting and 180-day log retention. Critical for cybersecurity compliance questions.
Answer: True
Deception technology deploys realistic fake assets (servers, credentials, data) to lure attackers, enabling early detection, threat intelligence, and reduced dwell time. Complements prevention/detection controls. Used in enterprise security and critical infrastructure protection. Important for advanced cybersecurity questions.
Answer: Parquet
Parquet is a columnar storage format optimized for analytics: efficient compression, predicate pushdown, and schema evolution. Reduces I/O by reading only required columns. Used in Spark, Hive, Presto. CSV/JSON are row-oriented; XML is verbose. Critical for big data engineering questions.