Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
API Gateway abstracts microservices complexity: request routing, authentication, rate limiting, caching, monitoring. Critical for secure, manageable microservices architectures.
Answer: Caching
Caching (Redis, Memcached) stores hot data in RAM for sub-millisecond access, reducing database load. Critical for high-traffic applications. Trade-offs: cache invalidation, consistency.
Answer: Fund of Funds for Startups
FFS (₹10,000 crore) managed by SIDBI invests in AIFs that fund startups. Focuses on innovation, job creation, strategic sectors. Part of Startup India ecosystem support.
Answer: True
Digital India (launched 2015) has three pillars: digital infrastructure as utility, governance & services on demand, digital empowerment of citizens. Encompasses Aadhaar, UPI, DigiLocker, BharatNet, etc.
Answer: Anonymization
Anonymization irreversibly removes/alters PII to prevent re-identification. Techniques: k-anonymity, l-diversity, differential privacy. Critical for privacy-preserving analytics and GDPR/DPDP compliance.
Answer: End-to-End / Comprehensive
End-to-end encryption protects data throughout lifecycle: at rest (storage), in transit (network), in use (processing via confidential computing). Critical for data protection and compliance questions.
Answer: IEC 62443
IEC 62443 provides cybersecurity standards for industrial automation and control systems (IACS). Addresses OT-specific threats: safety, availability, integrity. Critical for critical infrastructure protection questions.
Answer: True
Geopolitical tensions and pandemic disruptions drove policies: US CHIPS Act, EU Chips Act, India Semiconductor Mission. Aim to reduce concentration risk and ensure strategic autonomy. Critical for tech geopolitics questions.
Answer: DevOps Engineer
DevOps Engineers use IaC (Terraform, Ansible), CI/CD, and monitoring to automate infrastructure. Critical for cloud operations and agile delivery. High demand in Indian tech sector.
Answer: Responsibility Segregation / CQRS
CQRS separates read (query) and write (command) models, enabling independent scaling, optimization, and consistency models. Often combined with Event Sourcing. Critical for high-performance systems design.
Answer: ACID Properties
ACID (Atomicity, Consistency, Isolation, Durability) guarantees reliable transaction processing. Critical for banking, inventory, and other mission-critical applications. NoSQL may relax ACID for scalability.
Answer: True
IBN uses AI/ML to interpret business intent (e.g., 'prioritize VoIP'), auto-configure network, and continuously verify compliance. Reduces manual errors and operational complexity. Critical for autonomous networks questions.
Answer: Both A and B
Startup India facilitates corporate-startup partnerships; many corporates run innovation challenges for pilots. Critical for startup growth and enterprise innovation questions.
Answer: RTI Online
RTI Online Portal (rtionline.gov.in) enables citizens to file Right to Information applications digitally, pay fees online, and track status. Enhances transparency and accountability in governance.
Answer: Tokenization
Tokenization replaces sensitive values (credit cards) with format-preserving tokens, reversible via secure vault. Used in payments, healthcare. Critical for PCI-DSS compliance and data protection questions.
Answer: True
CASBs sit between users and cloud services to enforce: access control, data loss prevention, threat protection, and compliance. Critical for securing SaaS adoption in enterprises.
Answer: Both A and B
ISO 27035 and NIST SP 800-61 provide frameworks for incident handling: preparation, detection, analysis, containment, eradication, recovery, lessons learned. Critical for security operations questions.
Answer: Indigenization / Self-Reliance
Technological sovereignty (Atmanirbhar Bharat) promotes domestic R&D, manufacturing, and standards to reduce strategic dependencies. Critical for understanding India's tech policy and security questions.
Answer: All of these
CCSP (Certified Cloud Security Professional) focuses on cloud; CISSP covers broad security; CISM emphasizes management. All valued for security leadership roles. Critical for cybersecurity career questions.
Answer: True
Event Sourcing records all state changes as events, enabling reconstruction of any historical state. Supports audit, debugging, and CQRS patterns. Critical for compliant, auditable systems design.