Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Micro-segmentation creates granular security zones, containing breaches and limiting attacker movement.
Answer: True
Data minimization limits collection to what's necessary for specified purpose. Reduces privacy risks, storage costs, breach impact.
Answer: True
Defensive distillation trains a student model to mimic a teacher's softened outputs, reducing gradient magnitudes and adversarial vulnerability.
Answer: True
IAM systems manage user identities, authentication, authorization. Critical for implementing least privilege access controls in Zero Trust.
Answer: PM-WANI
PM-WANI enables public Wi-Fi hotspots via Public Data Offices using satellite/fiber backhaul. Aims to provide affordable internet in rural/remote areas.
Answer: Aditya
Aditya-L1 positioned at Sun-Earth L1 point for uninterrupted solar observation. Studies coronal heating, CMEs, solar flares for space weather forecasting.
Answer: True
India Semiconductor Mission implements ₹76,000 crore incentive scheme for fabs, display fabs, ATMP, design. Partnerships with global players announced.
Answer: All of these
Leading qubit implementations: superconducting (IBM, Google), trapped ions (IonQ), photonic (Xanadu). Each has trade-offs in coherence, scalability, error rates.
Answer: 8000
NM-QTA funds quantum computing, communication, sensing, materials research. Implemented by DST with IITs, IISc participation.
Answer: True
Right to Portability (GDPR Article 20) enables individuals to obtain and reuse personal data across services. Promotes competition and user control.
Answer: GDPR
GDPR Article 33 requires breach notification to supervisory authority within 72 hours of awareness. Critical for incident response compliance.
Answer: Purpose
Purpose Limitation prevents function creep by ensuring data is used only as consented. Core principle in GDPR, DPDP Act, and global privacy frameworks.
Answer: True
Membership inference exploits model confidence to infer training data membership. Mitigation: differential privacy, regularization, output perturbation.
Answer: Both A and B
Data poisoning injects malicious samples; backdoor attacks embed triggers that activate misclassification. Both compromise model integrity during training.
Answer: True
Runtime security (Falco, Tetragon) monitors system calls, network activity, file access in real-time to detect threats in containerized environments.
Answer: Both A and B
Security Context defines pod/container privileges; Pod Security Standards enforce baseline/restricted policies. Both critical for container security.
Answer: IaC / Infrastructure as Code
IaC scanning (Checkov, tfsec) analyzes Terraform/CloudFormation for misconfigurations before deployment. Critical for shift-left security in DevOps.
Answer: True
SDP creates dynamic, identity-based perimeters: resources invisible until user/device authenticated and authorized. Critical for reducing attack surface.
Answer: Both A and B
Behavioral biometrics analyzes typing, mouse movements; adaptive authentication adjusts requirements based on risk. Both enable continuous verification in Zero Trust.
Answer: 800-207
NIST SP 800-207 provides comprehensive Zero Trust guidance: identity verification, device trust, network segmentation, continuous monitoring.