GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 1241–1260 of 1857 questions
technology medium mcq

Which technique analyzes network traffic patterns to detect anomalies without known signatures?

  1. Signature-based Detection
  2. Behavioral Analytics
  3. Heuristic Analysis
  4. Sandboxing
technology medium mcq

Which metric measures the time from code commit to production deployment?

  1. Mean Time to Recovery
  2. Deployment Frequency
  3. Lead Time for Changes
  4. Change Failure Rate
technology medium mcq

Which Kubernetes object defines the desired state for a set of identical pods?

  1. Pod
  2. Service
  3. Deployment
  4. ConfigMap
technology hard mcq

Which data format is most efficient for columnar storage and analytics workloads?

  1. CSV
  2. JSON
  3. Parquet
  4. XML
technology medium mcq

Which attack exploits trust relationships between cloud services to escalate privileges?

  1. Phishing
  2. Cloud Jacking
  3. Identity Federation Attack
  4. API Abuse
technology medium mcq

Which practice involves automatically testing and deploying code changes through a pipeline?

  1. Continuous Integration
  2. Continuous Deployment
  3. CI/CD
  4. All of these
technology medium mcq

Which pattern enables resilient communication between microservices by handling transient failures?

  1. Circuit Breaker
  2. Load Balancer
  3. API Gateway
  4. Service Mesh
technology hard mcq

Which proposed Indian legislation aims to replace the IT Act 2000 with comprehensive digital governance framework?

  1. Digital India Act
  2. Data Protection Bill
  3. Cyber Security Strategy
  4. Platform Regulation Act
technology medium mcq

Which data processing paradigm is best suited for real-time analytics on streaming data?

  1. Batch Processing
  2. Stream Processing
  3. ETL Pipeline
  4. Data Warehousing
technology hard mcq

Which cybersecurity framework implements 'never trust, always verify' principle for all access requests?

  1. Defense in Depth
  2. Zero Trust Architecture
  3. Perimeter Security
  4. Role-Based Access Control
technology hard mcq

Which emerging technology combines quantum sensing with AI for ultra-precise navigation without GPS?

  1. Quantum Inertial Navigation
  2. LiDAR Mapping
  3. Satellite Altimetry
  4. Cellular Triangulation
technology medium mcq

Which technology enables crowd-sourced disaster reporting and situational awareness via mobile apps?

  1. GIS Mapping
  2. Social Media Analytics
  3. Crowdsourcing Platforms
  4. All of these
technology medium mcq

Which Indian initiative aims to create a national blockchain framework for government applications?

  1. IndiaChain
  2. Blockchain for Good
  3. National Ledger
  4. Digital India Blockchain
technology medium mcq

Which technology enables real-time translation of Indian regional languages for inclusive digital access?

  1. OCR
  2. Neural Machine Translation
  3. Speech Synthesis
  4. All of these
technology medium mcq

Which technology area sees India as a global hub for cost-effective innovation and frugal engineering?

  1. Space Launch Services
  2. Medical Devices
  3. Renewable Energy
  4. All of these
technology hard mcq

Which technology enables secure multi-party computation where parties jointly compute a function without revealing inputs?

  1. Homomorphic Encryption
  2. Secure Multi-Party Computation
  3. Zero-Knowledge Proofs
  4. All of these
technology medium mcq

Which technology enables real-time earthquake early warning by detecting P-waves before destructive S-waves arrive?

  1. Seismometer Networks
  2. GPS Monitoring
  3. Satellite InSAR
  4. All of these
technology medium mcq

Which feature helps users with motor disabilities control devices using eye movements?

  1. Voice Control
  2. Eye Tracking
  3. Gesture Recognition
  4. Brain-Computer Interface