Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Both A and B
ML security testing: adversarial examples test robustness, penetration testing finds implementation flaws. Critical for secure AI deployment in sensitive domains.
Answer: Both A and B
Code LLMs (Codex, CodeLlama) trained on code corpora enable natural language to code generation. Program synthesis automates code creation from specifications. Critical for developer productivity tools.
Answer: TRAI
Telecom Regulatory Authority of India (TRAI) recommends policies, regulates tariffs, ensures QoS, and manages spectrum auctions. Critical for telecom sector governance questions.
Answer: All of these
High-cardinality handling: one-hot for low cardinality, target encoding for medium, embeddings for high (deep learning). Choice depends on model type and cardinality. Critical for feature preprocessing.
Answer: ROC-AUC
ROC-AUC (Receiver Operating Characteristic - Area Under Curve) measures classifier performance across all thresholds, robust to class imbalance. Critical for evaluating binary classification models.
Answer: Multi-Site Active-Active
Active-active runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Highest cost but maximum resilience. Critical for mission-critical systems.
Answer: Both A and B
Auto-scaling adjusts resource count based on CPU, memory, or custom metrics; load balancing distributes traffic across instances. Combined for elastic, resilient cloud applications.
Answer: Both A and B
Vulnerability scanners (Nessus, Qualys, OpenVAS) identify security weaknesses, prioritize by risk, and track remediation. Critical for proactive security posture management.
Answer: Both A and B
Data drift: input feature distribution changes; concept drift: relationship between features and target changes. Monitoring both enables timely model retraining. Critical for production ML reliability.
Answer: RAG
Retrieval-Augmented Generation (RAG) combines LLMs with vector database retrieval, grounding responses in verified sources. Reduces hallucinations and enables knowledge updates without retraining.
Answer: Both A and B
ISO/IEC 24760 provides identity management framework; W3C DID enables decentralized identifiers. Both support interoperable, privacy-preserving digital identity systems. Critical for identity policy questions.
Answer: Both A and B
Digital India encourages FOSS adoption for cost-effectiveness, security, and vendor independence. MeitY's FOSS policy provides guidelines for government use. Critical for sustainable digital governance.
Answer: SMOTE
SMOTE (Synthetic Minority Over-sampling Technique) creates synthetic examples by interpolating between minority class neighbors. Improves classifier performance on imbalanced data vs simple oversampling.
Answer: Scatter Plot
Scatter plots display individual data points for two variables, revealing correlations, clusters, and outliers. Foundation for regression analysis and exploratory data science.
Answer: All of these
Data splitting strategies: holdout (simple split), cross-validation (multiple folds), bootstrap (resampling). Critical for reliable model evaluation and generalization assessment.
Answer: Event-Driven Architecture
Event-driven architecture uses message brokers (Kafka, RabbitMQ) for asynchronous, decoupled service communication. Enables scalability, resilience, and real-time processing. Critical for modern distributed systems.
Answer: CaaS
CaaS (Container as a Service) provides managed Kubernetes (EKS, AKS, GKE) for container deployment, scaling, and management. Abstracts infrastructure while retaining control. Critical for cloud-native development.
Answer: All of these
Malware analysis combines: static (code inspection), dynamic (runtime behavior), sandboxing (isolated execution). Critical for threat intelligence and incident response.
Answer: Anomaly-based
Anomaly detection establishes baselines of normal behavior and flags deviations, enabling zero-day threat detection. Critical for advanced threat protection in modern SOCs.
Answer: All of these
Responsible MLOps: model cards document limitations, fairness audits detect bias across groups, A/B testing validates real-world impact. Critical for ethical AI deployment.