Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Data lakes store raw structured/unstructured data; warehouses store curated data.
Answer: Parquet
Parquet is columnar storage format optimized for analytics: compression, predicate pushdown.
Answer: Stream
Stream processing handles continuous data flows for real-time insights.
Answer: True
CDC captures database operations and streams to targets for real-time analytics.
Answer: True
IOCs are forensic artifacts indicating potential breaches. Used for proactive blocking.
Answer: True
Micro-segmentation creates granular security zones, containing breaches and limiting attacker movement.
Answer: Both A and B
MFA requires multiple authentication factors; adaptive authentication adjusts requirements based on risk context.
Answer: FAME
FAME provides demand incentives for EVs and charging infrastructure.
Answer: True
Positional encodings add sequence order information to token embeddings, critical for language understanding tasks.
Answer: Attention Mechanism
Self-attention computes weighted relationships between tokens, enabling context-aware processing. Foundation of Transformer success.
Answer: Both A and B
Data catalogs enable discovery; data lineage tracks data flow and transformations. Both critical for data governance.
Answer: Edge
Edge computing processes data near source, reducing round-trip latency to cloud. Critical for IoT, autonomous vehicles.
Answer: True
CEP engines detect complex patterns, correlations, and sequences in real-time streams. Critical for fraud detection, monitoring.
Answer: Both A and B
Kafka excels at high-throughput event streaming; RabbitMQ at flexible routing. Both enable event-driven architectures.
Answer: All of these
Malware analysis combines: static (code inspection), dynamic (runtime behavior), sandboxing (isolated execution).
Answer: Both A and B
Managed secrets managers store, rotate, and control access to credentials, API keys, certificates. Critical for secure cloud applications.
Answer: UEBA / User and Entity Behavior
UEBA uses ML to establish behavioral baselines and detect anomalies indicating compromised accounts or insider threats.
Answer: True
IAM systems manage user identities, authentication, authorization. Critical for implementing least privilege access controls.
Answer: Both A and B
EDR monitors endpoint behavior; device posture assesses security configuration. Both enable continuous verification in Zero Trust.
Answer: All of these
Digital India ecosystem: UMANG for service delivery, MyGov for citizen engagement, DigiLocker for documents.