Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Both A and B
Data poisoning injects malicious samples; backdoor attacks embed triggers that activate misclassification. Both compromise model integrity during training.
Answer: Both A and B
Security Context defines pod/container privileges; Pod Security Standards enforce baseline/restricted policies. Both critical for container security.
Answer: Both A and B
Behavioral biometrics analyzes typing, mouse movements; adaptive authentication adjusts requirements based on risk. Both enable continuous verification in Zero Trust.
Answer: Panchamrit Strategy
Panchamrit (five nectars) announced at COP26 includes: 500 GW non-fossil capacity, 50% energy from renewables, 1 billion tonne CO2 reduction, net-zero by 2070.
Answer: Both A and B
Neuromorphic chips use spiking neurons that fire only when needed, and event-driven computation that processes only changes. Critical for edge AI with tight power budgets.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, threatening RSA encryption. Requires fault-tolerant quantum computers not yet available at scale.
Answer: Both A and B
GDPR requires explicit consent for special category data; ePrivacy Directive covers electronic communications. Both emphasize user control and transparency in data processing.
Answer: All of these
Adversarial defenses: adversarial training includes perturbed examples, defensive distillation smooths outputs, randomized smoothing adds noise. All improve robustness against adversarial attacks.
Answer: All of these
Kubernetes security: Pod Security Policies restrict privileges, Network Policies control traffic, Resource Limits prevent DoS. Combined for defense-in-depth in container environments.
Answer: All of these
Zero Trust combines: never trust always verify (continuous authentication), assume breach (detect/contain threats), least privilege (minimum access). All principles work together for comprehensive security.
Answer: Transformer
Transformer uses self-attention for parallel sequence processing.
Answer: Time Series Forecasting
Time series forecasting models temporal patterns.
Answer: Parquet
Parquet is columnar storage optimized for analytics.
Answer: All of these
Kafka, Flink, Spark Streaming enable real-time analytics.
Answer: Both A and B
STIX/TAXII standardizes exchange; MITRE ATT&CK catalogs TTPs.
Answer: CSPM
CSPM automates detection/remediation of misconfigurations.
Answer: Both A and B
MFA requires multiple factors; adaptive authentication adjusts based on risk.
Answer: All of these
Digital India ecosystem: UMANG, MyGov, DigiLocker.
Answer: Both A and B
Startup India integrates Hub, DPIIT recognition, NITI Aayog policy.
Answer: Gaganyaan
Gaganyaan is ISRO's human spaceflight program.