Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Micro-segmentation creates granular security zones, containing breaches and limiting attacker movement.
Answer: True
Data minimization limits collection to what's necessary for specified purpose. Reduces privacy risks, storage costs, breach impact.
Answer: True
Defensive distillation trains a student model to mimic a teacher's softened outputs, reducing gradient magnitudes and adversarial vulnerability.
Answer: True
IAM systems manage user identities, authentication, authorization. Critical for implementing least privilege access controls in Zero Trust.
Answer: PM-WANI
PM-WANI enables public Wi-Fi hotspots via Public Data Offices using satellite/fiber backhaul. Aims to provide affordable internet in rural/remote areas.
Answer: Aditya
Aditya-L1 positioned at Sun-Earth L1 point for uninterrupted solar observation. Studies coronal heating, CMEs, solar flares for space weather forecasting.
Answer: True
India Semiconductor Mission implements ₹76,000 crore incentive scheme for fabs, display fabs, ATMP, design. Partnerships with global players announced.
Answer: Molecular / Biochemical
Molecular computing uses DNA, proteins, or cellular processes for massive parallelism. Research stage with potential for ultra-low power, complex problem solving.
Answer: True
QEC codes (surface code, Shor code) encode logical qubits across many physical qubits to detect/correct errors. Critical for fault-tolerant quantum computing.
Answer: All of these
Leading qubit implementations: superconducting (IBM, Google), trapped ions (IonQ), photonic (Xanadu). Each has trade-offs in coherence, scalability, error rates.
Answer: 8000
NM-QTA funds quantum computing, communication, sensing, materials research. Implemented by DST with IITs, IISc participation.
Answer: True
Right to Portability (GDPR Article 20) enables individuals to obtain and reuse personal data across services. Promotes competition and user control.
Answer: GDPR
GDPR Article 33 requires breach notification to supervisory authority within 72 hours of awareness. Critical for incident response compliance.
Answer: Purpose
Purpose Limitation prevents function creep by ensuring data is used only as consented. Core principle in GDPR, DPDP Act, and global privacy frameworks.
Answer: True
Membership inference exploits model confidence to infer training data membership. Mitigation: differential privacy, regularization, output perturbation.
Answer: Both A and B
Data poisoning injects malicious samples; backdoor attacks embed triggers that activate misclassification. Both compromise model integrity during training.
Answer: Randomized
Randomized smoothing provides certified robustness guarantees against adversarial perturbations by averaging predictions over noisy inputs.
Answer: True
Runtime security (Falco, Tetragon) monitors system calls, network activity, file access in real-time to detect threats in containerized environments.
Answer: Both A and B
Security Context defines pod/container privileges; Pod Security Standards enforce baseline/restricted policies. Both critical for container security.
Answer: IaC / Infrastructure as Code
IaC scanning (Checkov, tfsec) analyzes Terraform/CloudFormation for misconfigurations before deployment. Critical for shift-left security in DevOps.