Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Zero Trust
Zero Trust Security assumes breach and verifies every request regardless of source. Implements: identity verification, least privilege, micro-segmentation, and continuous monitoring. Contrasts with perimeter-based 'castle-and-moat' model. Critical for modern enterprise security architecture.
Answer: True
Blue-Green deployment: run current version (Blue) and new version (Green) in parallel; switch traffic to Green after validation. Enables instant rollback by reverting traffic. Reduces risk vs in-place updates. Critical for zero-downtime release strategies in DevOps.
Answer: Apache Spark
Apache Spark provides in-memory distributed computing for big data: batch, streaming, ML, graph processing. Faster than Hadoop MapReduce due to in-memory processing. Supports Scala, Python, SQL. Critical for big data engineering and analytics questions.
Answer: Containerization
Containerization (Docker, containerd) packages apps with runtime, libraries, and config into isolated, portable containers. Enables consistent deployment across environments. Contrasts with VMs (heavier, OS-level isolation). Foundation of cloud-native architecture. Critical for modern deployment questions.
Answer: Behavioral Analytics
Behavioral Analytics uses ML to establish baselines of normal behavior and flag deviations indicating threats (insider threats, zero-days). Complements signature-based detection. Implemented in UEBA, NDR solutions. Critical for next-gen SOC and threat hunting questions.
Answer: True
IT Rules 2021 mandate Significant Social Media Intermediaries (50L+ users) to appoint: Chief Compliance Officer, Nodal Contact Person, and Resident Grievance Officer. Also require traceability of first originator for certain messages. Critical for platform governance and compliance questions.
Answer: Lead Time for Changes
Lead Time for Changes (DORA metric) measures time from code commit to successful production deployment. Key indicator of delivery speed and process efficiency. Other DORA metrics: Deployment Frequency, Change Failure Rate, MTTR. Critical for DevOps performance questions.
Answer: ETL
ETL (Extract, Transform, Load) is foundational data integration process: extract from sources, transform (clean, enrich, aggregate), load to target (warehouse, lake). Modern variants: ELT (load first, transform later) for cloud data platforms. Critical for data pipeline questions.
Answer: Deployment
Deployment manages replica sets of pods: defines replicas, update strategy, rollback, and scaling. Ensures desired state is maintained. Pod is smallest deployable unit; Service exposes pods; ConfigMap stores configuration. Critical for Kubernetes administration questions.
Answer: Section 10
Section 10 of DPDP Act mandates Significant Data Fiduciaries (based on data volume, sensitivity, risk) to appoint DPO, conduct audits, and implement grievance redressal. Enhances accountability for high-risk data processing. Critical for compliance and governance questions.
Answer: Observability
Observability enables understanding system internal state from external outputs: metrics (Prometheus), logs (ELK), traces (Jaeger). Goes beyond monitoring by enabling debugging of unknown issues. Critical for SRE practices and cloud operations questions in technical exams.
Answer: True
Service mesh (Istio, Linkerd, Consul) deploys sidecar proxies to handle service-to-service communication: mTLS encryption, traffic splitting, retries, metrics, and distributed tracing. Decouples infrastructure concerns from application code. Critical for cloud-native architecture questions.
Answer: Identity Federation Attack
Identity federation attacks exploit trust between identity providers (IdP) and service providers (SP) in SSO setups. Attackers compromise IdP to gain access to multiple federated services. Mitigation: MFA, short-lived tokens, strict trust policies. Critical for cloud security architecture questions.
Answer: RBI
Reserve Bank of India (RBI) regulates payment systems under Payment and Settlement Systems Act 2007. Oversees UPI, cards, wallets, PPIs, and fintech innovations. Issues guidelines for security, interoperability, and consumer protection. Critical for banking and fintech policy questions.
Answer: All of these
CI/CD pipeline automates: Continuous Integration (code merge + testing), Continuous Delivery (release-ready artifacts), Continuous Deployment (auto-production release). Tools: Jenkins, GitLab CI, GitHub Actions. Critical for agile software delivery and DevOps questions in technical exams.
Answer: True
Data lakes (S3, ADLS) store raw structured/unstructured data for flexible analysis; data warehouses (Snowflake, Redshift) store curated, schema-on-write data for BI. Modern architectures use lakehouse pattern combining both. Critical for understanding data platform design in analytics exams.
Answer: Circuit Breaker
Circuit Breaker pattern prevents cascading failures by stopping requests to failing services temporarily, allowing recovery. Implemented in libraries like Resilience4j, Hystrix. Service mesh (Istio, Linkerd) provides infrastructure-level resilience. Critical for building fault-tolerant distributed systems.
Answer: True
IaC tools (Terraform, CloudFormation, Ansible) define infrastructure in declarative code files, enabling version control, peer review, automated testing, and consistent deployments across environments. Reduces configuration drift and manual errors. Critical for cloud operations and DevOps questions in technical exams.
Answer: Stream Processing
Stream Processing (Apache Kafka, Flink, Spark Streaming) processes data in real-time as it arrives, enabling instant insights for fraud detection, IoT monitoring, and live dashboards. Batch processing handles historical data; ETL transforms data for storage; data warehousing supports analytical queries. Critical for modern data architecture questions.
Answer: Kubernetes
Kubernetes (K8s) is the de facto standard for container orchestration, providing automated deployment, scaling, load balancing, and self-healing for containerized applications. Originally developed by Google, now maintained by CNCF. Essential for cloud-native architecture questions in technical exams.