Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Both A and B
GDPR Article 35 and DPDP Act Section 10 require DPIAs for processing likely to result in high risk to individuals' rights. Critical for privacy-by-design compliance.
Answer: Differential
Differential Privacy adds mathematical noise to model outputs, providing provable privacy guarantees against membership inference and model inversion attacks.
Answer: True
Model extraction queries API to infer model architecture/parameters, enabling intellectual property theft or adversarial example generation. Mitigation: query rate limiting, output perturbation.
Answer: Backdoor Attack
Backdoor attacks inject malicious patterns during training that cause targeted misclassification when trigger present. Critical threat requiring robust training data validation.
Answer: Code
Security as Code defines policies in declarative format (OPA, Sentinel), enabling version control, testing, automated enforcement. Critical for scalable cloud security governance.
Answer: True
CWPP provides unified security for VMs, containers, serverless across AWS, Azure, GCP, on-premises. Critical for consistent security posture in hybrid cloud.
Answer: All of these
Comprehensive cloud security: IaC scanning (Terraform, CloudFormation), container image scanning, runtime protection (Falco, Tetragon). Combined for defense-in-depth.
Answer: Application-Layer
Application-layer encryption ensures data remains encrypted even if storage or network layers are compromised. Critical for end-to-end data protection in Zero Trust architectures.
Answer: True
Continuous authentication adjusts verification requirements based on behavioral analytics, device posture, location, and other risk signals. Critical for Zero Trust security posture.
Answer: Both A and B
Software-Defined Perimeter (SDP) creates identity-based perimeters; micro-segmentation isolates workloads. Both implement Zero Trust by limiting access to authenticated, authorized entities only.
Answer: Prompt
Instruction tuning fine-tunes LLMs on instruction datasets, improving task completion and helpfulness.
Answer: True
Stratified sampling maintains class proportions in train/test splits, critical for imbalanced classification.
Answer: Latency
CDNs distribute content to edge locations near users, reducing latency and origin load.
Answer: Middle
NEP 2020 emphasizes computational thinking, coding, AI exposure from Class 6 onwards.
Answer: Governance
Model registries manage model versions, parameters, metrics, deployment history.
Answer: Parameter
Hyperparameter tuning: grid search, random search, Bayesian optimization. Critical for maximizing performance.
Answer: Business
A/B testing randomly assigns users to model variants, measuring metrics like conversion, engagement.
Answer: Masked
Self-supervised learning creates supervisory signals from data structure: mask prediction, next sentence prediction.
Answer: 115BBH
Section 115BBH taxes crypto income at 30% plus cess, with 1% TDS on transactions.
Answer: Cellular / Biological
Cellular computing uses biochemical reactions in cells for parallel computation. Early research stage.