Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
IT Rules 2021 mandate Significant Social Media Intermediaries (50L+ users) to appoint: Chief Compliance Officer, Nodal Contact Person, and Resident Grievance Officer. Also require traceability of first originator for certain messages. Critical for platform governance and compliance questions.
Answer: Lead Time for Changes
Lead Time for Changes (DORA metric) measures time from code commit to successful production deployment. Key indicator of delivery speed and process efficiency. Other DORA metrics: Deployment Frequency, Change Failure Rate, MTTR. Critical for DevOps performance questions.
Answer: ETL
ETL (Extract, Transform, Load) is foundational data integration process: extract from sources, transform (clean, enrich, aggregate), load to target (warehouse, lake). Modern variants: ELT (load first, transform later) for cloud data platforms. Critical for data pipeline questions.
Answer: Deployment
Deployment manages replica sets of pods: defines replicas, update strategy, rollback, and scaling. Ensures desired state is maintained. Pod is smallest deployable unit; Service exposes pods; ConfigMap stores configuration. Critical for Kubernetes administration questions.
Answer: Section 10
Section 10 of DPDP Act mandates Significant Data Fiduciaries (based on data volume, sensitivity, risk) to appoint DPO, conduct audits, and implement grievance redressal. Enhances accountability for high-risk data processing. Critical for compliance and governance questions.
Answer: Observability
Observability enables understanding system internal state from external outputs: metrics (Prometheus), logs (ELK), traces (Jaeger). Goes beyond monitoring by enabling debugging of unknown issues. Critical for SRE practices and cloud operations questions in technical exams.
Answer: True
Service mesh (Istio, Linkerd, Consul) deploys sidecar proxies to handle service-to-service communication: mTLS encryption, traffic splitting, retries, metrics, and distributed tracing. Decouples infrastructure concerns from application code. Critical for cloud-native architecture questions.
Answer: Identity Federation Attack
Identity federation attacks exploit trust between identity providers (IdP) and service providers (SP) in SSO setups. Attackers compromise IdP to gain access to multiple federated services. Mitigation: MFA, short-lived tokens, strict trust policies. Critical for cloud security architecture questions.
Answer: RBI
Reserve Bank of India (RBI) regulates payment systems under Payment and Settlement Systems Act 2007. Oversees UPI, cards, wallets, PPIs, and fintech innovations. Issues guidelines for security, interoperability, and consumer protection. Critical for banking and fintech policy questions.
Answer: All of these
CI/CD pipeline automates: Continuous Integration (code merge + testing), Continuous Delivery (release-ready artifacts), Continuous Deployment (auto-production release). Tools: Jenkins, GitLab CI, GitHub Actions. Critical for agile software delivery and DevOps questions in technical exams.
Answer: True
Data lakes (S3, ADLS) store raw structured/unstructured data for flexible analysis; data warehouses (Snowflake, Redshift) store curated, schema-on-write data for BI. Modern architectures use lakehouse pattern combining both. Critical for understanding data platform design in analytics exams.
Answer: Circuit Breaker
Circuit Breaker pattern prevents cascading failures by stopping requests to failing services temporarily, allowing recovery. Implemented in libraries like Resilience4j, Hystrix. Service mesh (Istio, Linkerd) provides infrastructure-level resilience. Critical for building fault-tolerant distributed systems.
Answer: True
IaC tools (Terraform, CloudFormation, Ansible) define infrastructure in declarative code files, enabling version control, peer review, automated testing, and consistent deployments across environments. Reduces configuration drift and manual errors. Critical for cloud operations and DevOps questions in technical exams.
Answer: Stream Processing
Stream Processing (Apache Kafka, Flink, Spark Streaming) processes data in real-time as it arrives, enabling instant insights for fraud detection, IoT monitoring, and live dashboards. Batch processing handles historical data; ETL transforms data for storage; data warehousing supports analytical queries. Critical for modern data architecture questions.
Answer: Kubernetes
Kubernetes (K8s) is the de facto standard for container orchestration, providing automated deployment, scaling, load balancing, and self-healing for containerized applications. Originally developed by Google, now maintained by CNCF. Essential for cloud-native architecture questions in technical exams.
Answer: True
AI/ML-powered attacks can mutate malware code, generate polymorphic phishing content, and adapt evasion techniques in real-time to bypass signature-based defenses. Requires behavioral analytics, anomaly detection, and AI-powered defense systems. Critical for understanding next-generation threat landscape in cybersecurity exams.
Answer: True
Universal Design principles (equitable use, flexibility, simplicity, perceptible information) guide creation of inclusive products, buildings, and digital services. Adopted in Indian standards (GIGW, building codes). Critical for sustainable, inclusive development and rights-based approach questions.
Answer: All of these
Disaster response leverages: citizen reports via apps (NDMA, state SDMAs), social media monitoring for real-time intelligence, and GIS for visualizing crowd-sourced data. Enhances situational awareness and resource allocation. Critical for community resilience and participatory governance questions.
Answer: Partnership on AI / Open Source Initiative
Partnership on AI, Linux Foundation AI & Data, and Hugging Face community promote open-source AI models, datasets, and tools. India contributes via AI4Bharat, Krutrim, and research institutes. Critical for collaborative innovation and avoiding vendor lock-in questions.
Answer: IndiaChain
IndiaChain (proposed by MeitY) envisions a permissioned blockchain network for government services: land records, supply chain, identity, and certificates. Aims to enhance transparency, reduce fraud, and enable interoperability. Pilot projects underway in states. Critical for digital governance innovation questions.