Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Responsibility Segregation / CQRS
CQRS separates read (query) and write (command) models, enabling independent scaling, optimization, and consistency models. Often combined with Event Sourcing. Critical for high-performance systems design.
Answer: ACID Properties
ACID (Atomicity, Consistency, Isolation, Durability) guarantees reliable transaction processing. Critical for banking, inventory, and other mission-critical applications. NoSQL may relax ACID for scalability.
Answer: True
IBN uses AI/ML to interpret business intent (e.g., 'prioritize VoIP'), auto-configure network, and continuously verify compliance. Reduces manual errors and operational complexity. Critical for autonomous networks questions.
Answer: Both A and B
Startup India facilitates corporate-startup partnerships; many corporates run innovation challenges for pilots. Critical for startup growth and enterprise innovation questions.
Answer: RTI Online
RTI Online Portal (rtionline.gov.in) enables citizens to file Right to Information applications digitally, pay fees online, and track status. Enhances transparency and accountability in governance.
Answer: Tokenization
Tokenization replaces sensitive values (credit cards) with format-preserving tokens, reversible via secure vault. Used in payments, healthcare. Critical for PCI-DSS compliance and data protection questions.
Answer: True
CASBs sit between users and cloud services to enforce: access control, data loss prevention, threat protection, and compliance. Critical for securing SaaS adoption in enterprises.
Answer: Both A and B
ISO 27035 and NIST SP 800-61 provide frameworks for incident handling: preparation, detection, analysis, containment, eradication, recovery, lessons learned. Critical for security operations questions.
Answer: Indigenization / Self-Reliance
Technological sovereignty (Atmanirbhar Bharat) promotes domestic R&D, manufacturing, and standards to reduce strategic dependencies. Critical for understanding India's tech policy and security questions.
Answer: All of these
CCSP (Certified Cloud Security Professional) focuses on cloud; CISSP covers broad security; CISM emphasizes management. All valued for security leadership roles. Critical for cybersecurity career questions.
Answer: True
Event Sourcing records all state changes as events, enabling reconstruction of any historical state. Supports audit, debugging, and CQRS patterns. Critical for compliant, auditable systems design.
Answer: Inverted Index
Inverted Index maps terms to documents containing them, enabling efficient full-text search. Used in Elasticsearch, Solr. Critical for search engines and content management questions.
Answer: SLAAC
SLAAC (Stateless Address Autoconfiguration) uses router advertisements and MAC addresses to generate IPv6 addresses. Reduces management overhead vs DHCPv6. Critical for IPv6 deployment questions.
Answer: All of these
NIDHI-PRAYAS (DST) funds prototyping; Startup India offers tax benefits; AIM establishes incubators. Together they support innovation from ideation to scale. Critical for entrepreneurship ecosystem questions.
Answer: True
e-Office replaces paper files with digital workflows: creation, routing, approval, archiving. Improves efficiency, transparency, and remote work capability. Part of Digital India's governance transformation.
Answer: Both A and B
Searchable Encryption enables keyword search on ciphertext; Homomorphic Encryption enables computation on encrypted data. Both preserve privacy while enabling functionality. Critical for confidential cloud computing questions.
Answer: Zero
Zero Trust implements: identity verification, least privilege, micro-segmentation, continuous monitoring. Assumes no implicit trust based on network location. Critical for modern security architecture questions.
Answer: C2M2
C2M2 (Cybersecurity Capability Maturity Model) by US DOE assesses/improves cybersecurity in energy, water, and other critical sectors. Adopted globally for infrastructure resilience. Critical for critical infrastructure protection questions.
Answer: True
Modern trade agreements (DEPA, RCEP digital chapters) cover: cross-border data flows, data localization, e-commerce, and digital services taxation. Critical for understanding global digital economy governance.
Answer: All of these
Data scientists need: ML for modeling, SQL for data access, visualization for communication, plus domain knowledge. India's growing data economy demands multi-skilled professionals. Critical for tech career planning questions.