Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
ISRU extracts water ice, electrolyzes into hydrogen/oxygen for propellant. Critical for sustainable lunar exploration and deep space missions by reducing Earth launch mass.
Answer: True
QEC codes (surface code, Shor code) protect quantum information from decoherence and noise. Critical for fault-tolerant quantum computing but requires significant qubit overhead.
Answer: Differential
Differential Privacy mathematically guarantees query results don't reveal individual records. Used in census, health analytics, tech telemetry for privacy-preserving insights.
Answer: True
Accountability (GDPR Article 5, DPDP Act Section 8) requires documented policies, training, audits, and breach response procedures. Critical for regulatory compliance.
Answer: Both A and B
GDPR Article 35 and DPDP Act Section 10 require DPIAs for processing likely to result in high risk to individuals' rights. Critical for privacy-by-design compliance.
Answer: True
Model extraction queries API to infer model architecture/parameters, enabling intellectual property theft or adversarial example generation. Mitigation: query rate limiting, output perturbation.
Answer: Code
Security as Code defines policies in declarative format (OPA, Sentinel), enabling version control, testing, automated enforcement. Critical for scalable cloud security governance.
Answer: True
CWPP provides unified security for VMs, containers, serverless across AWS, Azure, GCP, on-premises. Critical for consistent security posture in hybrid cloud.
Answer: All of these
Comprehensive cloud security: IaC scanning (Terraform, CloudFormation), container image scanning, runtime protection (Falco, Tetragon). Combined for defense-in-depth.
Answer: Application-Layer
Application-layer encryption ensures data remains encrypted even if storage or network layers are compromised. Critical for end-to-end data protection in Zero Trust architectures.
Answer: True
Continuous authentication adjusts verification requirements based on behavioral analytics, device posture, location, and other risk signals. Critical for Zero Trust security posture.
Answer: Prompt
Instruction tuning fine-tunes LLMs on instruction datasets, improving task completion and helpfulness.
Answer: True
Stratified sampling maintains class proportions in train/test splits, critical for imbalanced classification.
Answer: Latency
CDNs distribute content to edge locations near users, reducing latency and origin load.
Answer: Middle
NEP 2020 emphasizes computational thinking, coding, AI exposure from Class 6 onwards.
Answer: Governance
Model registries manage model versions, parameters, metrics, deployment history.
Answer: Parameter
Hyperparameter tuning: grid search, random search, Bayesian optimization. Critical for maximizing performance.
Answer: Business
A/B testing randomly assigns users to model variants, measuring metrics like conversion, engagement.
Answer: Masked
Self-supervised learning creates supervisory signals from data structure: mask prediction, next sentence prediction.
Answer: 115BBH
Section 115BBH taxes crypto income at 30% plus cess, with 1% TDS on transactions.