Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Direction 20
CERT-In Direction 20 (April 2022) mandates service providers, intermediaries, and data centers to report cyber incidents within 6 hours of noticing. Also requires maintaining logs for 180 days, KYC for VPN users, and time synchronization. Aimed at improving incident response and threat intelligence sharing.
Answer: MeghRaj (GI Cloud)
MeghRaj (GI Cloud) is India's government cloud initiative launched by MeitY to optimize ICT spending, ensure data sovereignty, and provide secure, scalable cloud services to government entities. It empanels certified cloud service providers and defines standards for security, interoperability, and portability.
Answer: Double extortion ransomware
Double extortion ransomware combines file encryption with data theft. Attackers threaten to publish sensitive data if ransom isn't paid, increasing pressure on victims. This evolved tactic makes backups insufficient as a sole defense. Prevention requires DLP, encryption, network segmentation, and incident response planning.
Answer: B-Tree Index
B-Tree indexes maintain sorted data and allow efficient range queries, equality searches, and ordered retrieval. Hash indexes are optimal only for exact match lookups. Bitmap indexes work well for low-cardinality columns. Inverted indexes are used in full-text search engines.
Answer: All of these
Urban air quality combines IoT, satellites, AI for source attribution.
Answer: NISAR
NISAR is joint Earth-observation satellite using dual-frequency radar.
Answer: Ultra-Low Power
Neuromorphic chips achieve ultra-low power via event-driven, sparse computation.
Answer: Quantum Computing
Quantum computers simulate quantum systems exponentially faster for specific problems.
Answer: Zero-Knowledge Proofs
Zero-Knowledge Proofs enable proving statements without revealing data.
Answer: All of these
Production monitoring: drift detection, dashboards, alerting for anomalies.
Answer: Both A and B
FFS invests in AIFs; NIDHI-PRAYAS funds prototyping. Both support strategic sector innovation.
Answer: Both A and B
NIST IR 8259 and ETSI EN 303 645 provide IoT security baselines: secure boot, updates, data protection.
Answer: Impermanent Loss
Impermanent loss occurs when token prices diverge, reducing value vs holding tokens. Critical risk for liquidity providers.
Answer: Both A and B
Event-driven computation and spiking neurons enable efficient processing of sparse, temporal data.
Answer: Both A and B
Homomorphic Encryption enables computation on ciphertext; SMPC enables joint processing without sharing inputs.
Answer: Collateralized Lending
Collateralized lending protocols allow borrowing by locking crypto collateral, with automatic liquidation if collateral value drops.
Answer: NISAR
NISAR is a joint Earth-observation satellite using dual-frequency radar to monitor ecosystems, ice masses, vegetation.
Answer: Ultra-Low Power
Neuromorphic chips achieve ultra-low power via event-driven, sparse computation. Critical for battery-powered edge AI.
Answer: Oracle Manipulation
Oracle manipulation feeds false prices to DeFi protocols, triggering incorrect liquidations or arbitrage. Critical vulnerability requiring decentralized, robust oracles.
Answer: Aditya-L1
Aditya-L1 positioned at Sun-Earth L1 point for uninterrupted solar observation. Studies coronal heating, CMEs, solar flares.