Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: End-to-End / Comprehensive
End-to-end encryption protects data throughout lifecycle: at rest (storage), in transit (network), in use (processing via confidential computing). Critical for data protection and compliance questions.
Answer: IEC 62443
IEC 62443 provides cybersecurity standards for industrial automation and control systems (IACS). Addresses OT-specific threats: safety, availability, integrity. Critical for critical infrastructure protection questions.
Answer: True
Geopolitical tensions and pandemic disruptions drove policies: US CHIPS Act, EU Chips Act, India Semiconductor Mission. Aim to reduce concentration risk and ensure strategic autonomy. Critical for tech geopolitics questions.
Answer: DevOps Engineer
DevOps Engineers use IaC (Terraform, Ansible), CI/CD, and monitoring to automate infrastructure. Critical for cloud operations and agile delivery. High demand in Indian tech sector.
Answer: Responsibility Segregation / CQRS
CQRS separates read (query) and write (command) models, enabling independent scaling, optimization, and consistency models. Often combined with Event Sourcing. Critical for high-performance systems design.
Answer: ACID Properties
ACID (Atomicity, Consistency, Isolation, Durability) guarantees reliable transaction processing. Critical for banking, inventory, and other mission-critical applications. NoSQL may relax ACID for scalability.
Answer: True
IBN uses AI/ML to interpret business intent (e.g., 'prioritize VoIP'), auto-configure network, and continuously verify compliance. Reduces manual errors and operational complexity. Critical for autonomous networks questions.
Answer: Both A and B
Startup India facilitates corporate-startup partnerships; many corporates run innovation challenges for pilots. Critical for startup growth and enterprise innovation questions.
Answer: RTI Online
RTI Online Portal (rtionline.gov.in) enables citizens to file Right to Information applications digitally, pay fees online, and track status. Enhances transparency and accountability in governance.
Answer: Tokenization
Tokenization replaces sensitive values (credit cards) with format-preserving tokens, reversible via secure vault. Used in payments, healthcare. Critical for PCI-DSS compliance and data protection questions.
Answer: True
CASBs sit between users and cloud services to enforce: access control, data loss prevention, threat protection, and compliance. Critical for securing SaaS adoption in enterprises.
Answer: Both A and B
ISO 27035 and NIST SP 800-61 provide frameworks for incident handling: preparation, detection, analysis, containment, eradication, recovery, lessons learned. Critical for security operations questions.
Answer: Indigenization / Self-Reliance
Technological sovereignty (Atmanirbhar Bharat) promotes domestic R&D, manufacturing, and standards to reduce strategic dependencies. Critical for understanding India's tech policy and security questions.
Answer: All of these
CCSP (Certified Cloud Security Professional) focuses on cloud; CISSP covers broad security; CISM emphasizes management. All valued for security leadership roles. Critical for cybersecurity career questions.
Answer: True
Event Sourcing records all state changes as events, enabling reconstruction of any historical state. Supports audit, debugging, and CQRS patterns. Critical for compliant, auditable systems design.
Answer: Inverted Index
Inverted Index maps terms to documents containing them, enabling efficient full-text search. Used in Elasticsearch, Solr. Critical for search engines and content management questions.
Answer: SLAAC
SLAAC (Stateless Address Autoconfiguration) uses router advertisements and MAC addresses to generate IPv6 addresses. Reduces management overhead vs DHCPv6. Critical for IPv6 deployment questions.
Answer: All of these
NIDHI-PRAYAS (DST) funds prototyping; Startup India offers tax benefits; AIM establishes incubators. Together they support innovation from ideation to scale. Critical for entrepreneurship ecosystem questions.
Answer: True
e-Office replaces paper files with digital workflows: creation, routing, approval, archiving. Improves efficiency, transparency, and remote work capability. Part of Digital India's governance transformation.
Answer: Zero
Zero Trust implements: identity verification, least privilege, micro-segmentation, continuous monitoring. Assumes no implicit trust based on network location. Critical for modern security architecture questions.