Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Validity
Validity ensures data conforms to business rules, formats, and value ranges (e.g., email format, date ranges). Other dimensions: Accuracy (correctness), Completeness (no missing values), Consistency (across systems). Critical for data governance and quality management questions.
Answer: kube-scheduler
kube-scheduler assigns pods to nodes based on resource requests, constraints (node selectors, taints), and policies. Works with kubelet (node agent) and API server. Critical for understanding Kubernetes control plane architecture in cloud exams.
Answer: Homomorphic Encryption
Homomorphic Encryption allows computations on ciphertext, producing encrypted results that decrypt to correct output. Enables privacy-preserving cloud analytics, secure voting, and confidential AI. Still computationally intensive but advancing with research. Critical for privacy-enhancing technologies.
Answer: True
Digital India Act (proposed) aims to address: platform accountability, user rights, emerging tech governance, and algorithmic transparency. Complements DPDP Act and IT Rules. Critical for understanding India's evolving digital regulatory framework in policy exams.
Answer: Terraform
Terraform (HashiCorp) uses HCL declarative language to provision cloud resources across providers (AWS, Azure, GCP). Supports state management, modules, and plan/apply workflow. Ansible is configuration management; Jenkins is CI/CD; Docker is containerization. Critical for IaC questions.
Answer: Serverless / Athena
Serverless query engines (AWS Athena, Google BigQuery) enable SQL queries directly on data in object storage (S3, GCS) using schema-on-read. Eliminates ETL for ad-hoc analysis. Pay-per-query pricing. Critical for modern data lake architecture questions.
Answer: True
Authenticator apps (Google Authenticator, Authy) generate TOTP locally, immune to SIM swapping, SS7 attacks, and phishing that compromise SMS OTP. NIST recommends moving away from SMS for high-security applications. Critical for authentication best practices questions.
Answer: Data Protection Board of India
Data Protection Board of India is independent regulatory body established under DPDP Act 2023 to: adjudicate disputes, impose penalties, and enforce compliance. Distinct from CERT-In (cyber incidents) and MeitY (policy). Critical for data governance questions.
Answer: Chaos
Chaos Engineering (Netflix Chaos Monkey) proactively tests system resilience by injecting failures (network latency, instance termination) in controlled experiments. Builds confidence in fault tolerance. Requires monitoring, blast radius limits, and automated rollback. Critical for SRE practices.
Answer: Star Schema
Star Schema (data warehousing) uses denormalized fact tables linked to dimension tables for fast analytical queries. Optimizes read performance at cost of storage redundancy. Contrasts with 3NF (normalized for OLTP). Critical for BI and analytics architecture questions.
Answer: True
Serverless (AWS Lambda, Azure Functions) scales automatically: from zero to thousands of instances based on demand. Pay-per-execution pricing eliminates idle costs. Trade-offs: cold starts, execution time limits, vendor lock-in. Critical for cost-optimized cloud architecture questions.
Answer: RBI
RBI's Digital Lending Guidelines (2022) regulate: entity eligibility (banks/NBFCs only), direct fund flow, standardized disclosures, cooling-off period, and grievance redressal. Aims to protect consumers from predatory apps and data misuse. Critical for fintech compliance questions.
Answer: Automated Rollback
Automated Rollback uses monitoring alerts (error rate, latency) to trigger immediate reversion to previous stable version. Reduces MTTR and blast radius of bad releases. Implemented via CI/CD pipelines and SRE runbooks. Critical for production reliability practices.
Answer: True
CDC captures insert/update/delete operations from database logs (binlog, WAL) and streams to targets (Kafka, data lake). Enables real-time analytics, cache invalidation, and event-driven architectures. Tools: Debezium, AWS DMS. Critical for modern data integration patterns.
Answer: StatefulSet
StatefulSet manages stateful applications: provides stable pod names (pod-0, pod-1), persistent storage, and ordered deployment/scaling. Used for databases, Kafka, etc. Deployment is for stateless apps; DaemonSet runs one pod per node; ReplicaSet manages pod replicas.
Answer: Zero Trust
Zero Trust Security assumes breach and verifies every request regardless of source. Implements: identity verification, least privilege, micro-segmentation, and continuous monitoring. Contrasts with perimeter-based 'castle-and-moat' model. Critical for modern enterprise security architecture.
Answer: True
Blue-Green deployment: run current version (Blue) and new version (Green) in parallel; switch traffic to Green after validation. Enables instant rollback by reverting traffic. Reduces risk vs in-place updates. Critical for zero-downtime release strategies in DevOps.
Answer: Apache Spark
Apache Spark provides in-memory distributed computing for big data: batch, streaming, ML, graph processing. Faster than Hadoop MapReduce due to in-memory processing. Supports Scala, Python, SQL. Critical for big data engineering and analytics questions.
Answer: Containerization
Containerization (Docker, containerd) packages apps with runtime, libraries, and config into isolated, portable containers. Enables consistent deployment across environments. Contrasts with VMs (heavier, OS-level isolation). Foundation of cloud-native architecture. Critical for modern deployment questions.
Answer: Behavioral Analytics
Behavioral Analytics uses ML to establish baselines of normal behavior and flag deviations indicating threats (insider threats, zero-days). Complements signature-based detection. Implemented in UEBA, NDR solutions. Critical for next-gen SOC and threat hunting questions.