Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Digital India Act aims to address: platform accountability, user rights, emerging tech governance, algorithmic transparency. Complements DPDP Act and IT Rules.
Answer: Panchamrit Strategy
Panchamrit (five nectars) announced at COP26 includes: 500 GW non-fossil capacity, 50% energy from renewables, 1 billion tonne CO2 reduction, net-zero by 2070.
Answer: Chandrayaan
Chandrayaan-3's Vikram lander and Pragyan rover analyzed lunar soil near south pole, searching for water ice and studying surface composition.
Answer: True
UPI's success driven by interoperability, zero MDR, and innovation. Inspired similar systems globally: Singapore PayNow, UAE, France discussions.
Answer: True
QKD uses no-cloning theorem and measurement disturbance to detect eavesdropping. Provides provable security unlike computational security of classical cryptography.
Answer: Digital Personal Data Protection / DPDP
DPDP Act 2023 establishes framework for processing digital personal data in India, with rights for data principals and obligations for data fiduciaries.
Answer: True
Right to Erasure (Article 17 GDPR) allows individuals to request deletion when data is no longer necessary, consent withdrawn, or processing unlawful. Critical privacy right.
Answer: Both A and B
GDPR requires explicit consent for special category data; ePrivacy Directive covers electronic communications. Both emphasize user control and transparency in data processing.
Answer: True
Model inversion exploits model confidence scores to infer sensitive attributes of training data. Mitigation: differential privacy, output perturbation, access controls.
Answer: Container / Image
Container image scanning identifies known vulnerabilities, misconfigurations, and secrets in images before deployment. Critical for secure CI/CD pipelines in cloud-native environments.
Answer: True
Service mesh (Istio, Linkerd) automatically encrypts service-to-service traffic with mTLS, provides authentication, authorization, and observability without application code changes.
Answer: All of these
Kubernetes security: Pod Security Policies restrict privileges, Network Policies control traffic, Resource Limits prevent DoS. Combined for defense-in-depth in container environments.
Answer: Device Posture
Device posture assessment evaluates endpoint security: OS patches, antivirus status, encryption, compliance. Critical for Zero Trust access decisions in hybrid environments.
Answer: True
Micro-segmentation creates granular security policies around individual workloads/applications, containing breaches and preventing attackers from moving laterally across the network.
Answer: Thought
Chain-of-Thought prompting generates reasoning steps.
Answer: True
Fine-tuning updates weights on task-specific data.
Answer: Clustering
Clustering discovers natural groupings in unlabeled data.
Answer: True
Feature engineering: transformations, interactions, encoding.
Answer: Time Series Forecasting
Time series forecasting models temporal patterns.
Answer: Serverless
Serverless query engines query object storage directly.