Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Fund of Funds for Startups
FFS (₹10,000 crore) managed by SIDBI invests in AIFs that fund startups. Focuses on innovation, job creation, strategic sectors. Part of Startup India ecosystem support.
Answer: Anonymization
Anonymization irreversibly removes/alters PII to prevent re-identification. Techniques: k-anonymity, l-diversity, differential privacy. Critical for privacy-preserving analytics and GDPR/DPDP compliance.
Answer: IEC 62443
IEC 62443 provides cybersecurity standards for industrial automation and control systems (IACS). Addresses OT-specific threats: safety, availability, integrity. Critical for critical infrastructure protection questions.
Answer: DevOps Engineer
DevOps Engineers use IaC (Terraform, Ansible), CI/CD, and monitoring to automate infrastructure. Critical for cloud operations and agile delivery. High demand in Indian tech sector.
Answer: ACID Properties
ACID (Atomicity, Consistency, Isolation, Durability) guarantees reliable transaction processing. Critical for banking, inventory, and other mission-critical applications. NoSQL may relax ACID for scalability.
Answer: Both A and B
Startup India facilitates corporate-startup partnerships; many corporates run innovation challenges for pilots. Critical for startup growth and enterprise innovation questions.
Answer: Tokenization
Tokenization replaces sensitive values (credit cards) with format-preserving tokens, reversible via secure vault. Used in payments, healthcare. Critical for PCI-DSS compliance and data protection questions.
Answer: Both A and B
ISO 27035 and NIST SP 800-61 provide frameworks for incident handling: preparation, detection, analysis, containment, eradication, recovery, lessons learned. Critical for security operations questions.
Answer: All of these
CCSP (Certified Cloud Security Professional) focuses on cloud; CISSP covers broad security; CISM emphasizes management. All valued for security leadership roles. Critical for cybersecurity career questions.
Answer: Inverted Index
Inverted Index maps terms to documents containing them, enabling efficient full-text search. Used in Elasticsearch, Solr. Critical for search engines and content management questions.
Answer: All of these
NIDHI-PRAYAS (DST) funds prototyping; Startup India offers tax benefits; AIM establishes incubators. Together they support innovation from ideation to scale. Critical for entrepreneurship ecosystem questions.
Answer: Both A and B
Searchable Encryption enables keyword search on ciphertext; Homomorphic Encryption enables computation on encrypted data. Both preserve privacy while enabling functionality. Critical for confidential cloud computing questions.
Answer: C2M2
C2M2 (Cybersecurity Capability Maturity Model) by US DOE assesses/improves cybersecurity in energy, water, and other critical sectors. Adopted globally for infrastructure resilience. Critical for critical infrastructure protection questions.
Answer: All of these
Data scientists need: ML for modeling, SQL for data access, visualization for communication, plus domain knowledge. India's growing data economy demands multi-skilled professionals. Critical for tech career planning questions.
Answer: Sharding
Sharding partitions data horizontally across nodes based on key ranges or hashes, enabling horizontal scaling. Critical for handling large datasets in distributed databases. Trade-offs: cross-shard queries complexity.
Answer: OECD AI Principles
OECD AI Principles (2019) provide values-based guidelines: inclusive growth, human-centered values, transparency, robustness, accountability. Adopted by 40+ countries including India. Critical for AI governance questions.
Answer: Circuit Breaker
Circuit Breaker stops requests to failing services temporarily, allowing recovery. Prevents cascading failures in distributed systems. Implemented in resilience libraries. Critical for building fault-tolerant architectures.
Answer: SR-MPLS / SRv6
Segment Routing (SR-MPLS, SRv6) encodes path instructions in packet headers, enabling flexible traffic engineering without per-flow state. Critical for scalable, programmable networks. Important for advanced networking questions.
Answer: AI Ethics Officer
AI Ethics Officers govern responsible AI: bias mitigation, explainability, compliance. Growing demand in regulated sectors (finance, healthcare). Critical for emerging tech career questions.
Answer: Graph
Graph databases (Neo4j, Amazon Neptune) store nodes/edges for relationships, enabling efficient traversal for social networks, fraud detection, recommendations. Critical for relationship-rich data questions.