Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Homomorphic
Homomorphic Encryption enables processing ciphertext, producing encrypted results that decrypt to correct output. Critical for privacy-preserving cloud analytics, secure voting, and confidential AI. Still computationally intensive but advancing.
Answer: Shared Responsibility Model
Cloud providers secure infrastructure ('security OF cloud'); customers secure data/apps ('security IN cloud'). Responsibilities vary by service model (IaaS/PaaS/SaaS). Critical for cloud governance and compliance questions.
Answer: True
DPDP Act Section 8(5) mandates technical/organizational measures: encryption, access controls, incident response. Aligns with global standards (GDPR). Critical for data protection compliance questions.
Answer: T-Hub
T-Hub (Telangana) is India's largest innovation campus, connecting startups with corporates, investors, and mentors. Supports deep tech, healthtech, and enterprise solutions. Critical for understanding India's startup infrastructure questions.
Answer: e-Filing Portal
Income Tax e-Filing Portal enables online return submission, refund tracking, and compliance services. Integrated with Aadhaar, PAN, and pre-filled data. Critical for digital governance and taxpayer convenience questions.
Answer: Federated Learning
Federated Learning trains models across devices/servers holding local data, sharing only model updates. Preserves privacy while enabling collaborative AI. Used in healthcare, finance, and mobile keyboards. Critical for privacy-preserving AI questions.
Answer: True
Zero Trust assumes breach and verifies identity, device health, and context for every request. Implements micro-segmentation, least privilege, and continuous monitoring. Critical for modern security architecture questions.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers to report cyber incidents within 6 hours, maintain logs for 180 days, and synchronize clocks with National Time Server. Critical for incident response compliance questions.
Answer: Tinkering
Atal Tinkering Labs (ATL) by NITI Aayog provide makerspaces with tools (3D printers, robotics) for students to innovate. Fosters creativity, problem-solving, and entrepreneurship from school level. Critical for education innovation questions.
Answer: Both A and B
e-Courts project integrates video conferencing for virtual hearings, e-filing, and case management. Enhanced during pandemic for access to justice. Critical for digital governance and judicial reform questions.
Answer: True
Differential privacy mathematically guarantees that query results don't reveal individual records. Used in census data, health analytics, and tech company telemetry. Balances utility and privacy. Critical for privacy-preserving analytics questions.
Answer: CSPM
CSPM (Cloud Security Posture Management) automates detection/remediation of misconfigurations (public S3 buckets, open ports). Critical for preventing cloud breaches. CWPP protects workloads; CASB governs SaaS; SIEM aggregates logs. Important for cloud security operations questions.
Answer: 27001
ISO/IEC 27001 specifies requirements for establishing, implementing, and maintaining an Information Security Management System (ISMS). Certification demonstrates commitment to security best practices. Critical for enterprise security and compliance questions.
Answer: NIST Cybersecurity Framework
NIST CSF (Identify, Protect, Detect, Respond, Recover) provides flexible, risk-based approach to cybersecurity management. Widely adopted globally and referenced in Indian policies. Critical for security governance and compliance questions.
Answer: True
Metaverse Standards Forum (Khronos Group, Linux Foundation) develops open standards for interoperability: avatars, assets, identity across platforms. Critical for avoiding walled gardens and enabling open metaverse ecosystems. Important for future tech governance questions.
Answer: All of these
Smart buildings integrate IoT sensors (occupancy, temperature), BMS for HVAC/lighting control, and AI for predictive optimization. Reduces energy waste by 20-40%. Critical for green building and energy efficiency questions.
Answer: e-Sign / Aadhaar e-KYC
e-Sign enables Aadhaar-based digital signatures for documents, with legal validity under IT Act. Uses OTP/biometric authentication. Eliminates need for physical signatures in government/business processes. Critical for digital transaction and e-governance questions.
Answer: Physical Tampering
IoT devices are often deployed in accessible locations, vulnerable to physical tampering, theft, or environmental attacks. Requires hardware security modules, secure boot, and tamper-evident designs. Critical for IoT security architecture questions.
Answer: True
Large Language Models generate plausible text but can 'hallucinate' incorrect facts, especially for niche topics. Mitigation: retrieval-augmented generation (RAG), fact-checking layers, and human oversight. Critical for responsible AI deployment questions.
Answer: Blockchain/NFTs
Blockchain with NFTs (Non-Fungible Tokens) enables verifiable digital ownership, provenance tracking, and peer-to-peer transfers without intermediaries. Applications: art, gaming, identity, supply chain. Critical for understanding Web3 and digital economy questions.