Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Chaos
Chaos Engineering (Netflix Chaos Monkey) proactively tests system resilience by injecting failures (network latency, instance termination) in controlled experiments. Builds confidence in fault tolerance. Requires monitoring, blast radius limits, and automated rollback. Critical for SRE practices.
Answer: Star Schema
Star Schema (data warehousing) uses denormalized fact tables linked to dimension tables for fast analytical queries. Optimizes read performance at cost of storage redundancy. Contrasts with 3NF (normalized for OLTP). Critical for BI and analytics architecture questions.
Answer: True
Serverless (AWS Lambda, Azure Functions) scales automatically: from zero to thousands of instances based on demand. Pay-per-execution pricing eliminates idle costs. Trade-offs: cold starts, execution time limits, vendor lock-in. Critical for cost-optimized cloud architecture questions.
Answer: Meltdown/Spectre
Meltdown/Spectre (2018) exploit CPU speculative execution and cache side-channels to read kernel memory or other processes' data. Mitigated via microcode updates, OS patches, and compiler fixes. Highlights hardware-level security challenges. Critical for system security questions.
Answer: RBI
RBI's Digital Lending Guidelines (2022) regulate: entity eligibility (banks/NBFCs only), direct fund flow, standardized disclosures, cooling-off period, and grievance redressal. Aims to protect consumers from predatory apps and data misuse. Critical for fintech compliance questions.
Answer: Automated Rollback
Automated Rollback uses monitoring alerts (error rate, latency) to trigger immediate reversion to previous stable version. Reduces MTTR and blast radius of bad releases. Implemented via CI/CD pipelines and SRE runbooks. Critical for production reliability practices.
Answer: True
CDC captures insert/update/delete operations from database logs (binlog, WAL) and streams to targets (Kafka, data lake). Enables real-time analytics, cache invalidation, and event-driven architectures. Tools: Debezium, AWS DMS. Critical for modern data integration patterns.
Answer: StatefulSet
StatefulSet manages stateful applications: provides stable pod names (pod-0, pod-1), persistent storage, and ordered deployment/scaling. Used for databases, Kafka, etc. Deployment is for stateless apps; DaemonSet runs one pod per node; ReplicaSet manages pod replicas.
Answer: Zero Trust
Zero Trust Security assumes breach and verifies every request regardless of source. Implements: identity verification, least privilege, micro-segmentation, and continuous monitoring. Contrasts with perimeter-based 'castle-and-moat' model. Critical for modern enterprise security architecture.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers to synchronize ICT system clocks with NIC's National Time Server for accurate incident timeline correlation. Also mandates 6-hour incident reporting and 180-day log retention. Critical for cybersecurity compliance questions.
Answer: True
Blue-Green deployment: run current version (Blue) and new version (Green) in parallel; switch traffic to Green after validation. Enables instant rollback by reverting traffic. Reduces risk vs in-place updates. Critical for zero-downtime release strategies in DevOps.
Answer: Apache Spark
Apache Spark provides in-memory distributed computing for big data: batch, streaming, ML, graph processing. Faster than Hadoop MapReduce due to in-memory processing. Supports Scala, Python, SQL. Critical for big data engineering and analytics questions.
Answer: Containerization
Containerization (Docker, containerd) packages apps with runtime, libraries, and config into isolated, portable containers. Enables consistent deployment across environments. Contrasts with VMs (heavier, OS-level isolation). Foundation of cloud-native architecture. Critical for modern deployment questions.
Answer: Behavioral Analytics
Behavioral Analytics uses ML to establish baselines of normal behavior and flag deviations indicating threats (insider threats, zero-days). Complements signature-based detection. Implemented in UEBA, NDR solutions. Critical for next-gen SOC and threat hunting questions.
Answer: True
IT Rules 2021 mandate Significant Social Media Intermediaries (50L+ users) to appoint: Chief Compliance Officer, Nodal Contact Person, and Resident Grievance Officer. Also require traceability of first originator for certain messages. Critical for platform governance and compliance questions.
Answer: Lead Time for Changes
Lead Time for Changes (DORA metric) measures time from code commit to successful production deployment. Key indicator of delivery speed and process efficiency. Other DORA metrics: Deployment Frequency, Change Failure Rate, MTTR. Critical for DevOps performance questions.
Answer: ETL
ETL (Extract, Transform, Load) is foundational data integration process: extract from sources, transform (clean, enrich, aggregate), load to target (warehouse, lake). Modern variants: ELT (load first, transform later) for cloud data platforms. Critical for data pipeline questions.
Answer: Deployment
Deployment manages replica sets of pods: defines replicas, update strategy, rollback, and scaling. Ensures desired state is maintained. Pod is smallest deployable unit; Service exposes pods; ConfigMap stores configuration. Critical for Kubernetes administration questions.
Answer: True
Deception technology deploys realistic fake assets (servers, credentials, data) to lure attackers, enabling early detection, threat intelligence, and reduced dwell time. Complements prevention/detection controls. Used in enterprise security and critical infrastructure protection. Important for advanced cybersecurity questions.
Answer: Section 10
Section 10 of DPDP Act mandates Significant Data Fiduciaries (based on data volume, sensitivity, risk) to appoint DPO, conduct audits, and implement grievance redressal. Enhances accountability for high-risk data processing. Critical for compliance and governance questions.