Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
SDP creates dynamic, identity-based perimeters: resources invisible until user/device authenticated and authorized. Critical for reducing attack surface.
Answer: Both A and B
Behavioral biometrics analyzes typing, mouse movements; adaptive authentication adjusts requirements based on risk. Both enable continuous verification in Zero Trust.
Answer: 800-207
NIST SP 800-207 provides comprehensive Zero Trust guidance: identity verification, device trust, network segmentation, continuous monitoring.
Answer: True
Digital India Act aims to address: platform accountability, user rights, emerging tech governance, algorithmic transparency. Complements DPDP Act and IT Rules.
Answer: Panchamrit Strategy
Panchamrit (five nectars) announced at COP26 includes: 500 GW non-fossil capacity, 50% energy from renewables, 1 billion tonne CO2 reduction, net-zero by 2070.
Answer: Chandrayaan
Chandrayaan-3's Vikram lander and Pragyan rover analyzed lunar soil near south pole, searching for water ice and studying surface composition.
Answer: True
UPI's success driven by interoperability, zero MDR, and innovation. Inspired similar systems globally: Singapore PayNow, UAE, France discussions.
Answer: Both A and B
Neuromorphic chips use spiking neurons that fire only when needed, and event-driven computation that processes only changes. Critical for edge AI with tight power budgets.
Answer: DNA / Molecular
DNA data storage offers extreme density (exabytes/gram) and longevity (thousands of years). Research ongoing at IITs and global labs for archival applications.
Answer: True
QKD uses no-cloning theorem and measurement disturbance to detect eavesdropping. Provides provable security unlike computational security of classical cryptography.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, threatening RSA encryption. Requires fault-tolerant quantum computers not yet available at scale.
Answer: Digital Personal Data Protection / DPDP
DPDP Act 2023 establishes framework for processing digital personal data in India, with rights for data principals and obligations for data fiduciaries.
Answer: True
Right to Erasure (Article 17 GDPR) allows individuals to request deletion when data is no longer necessary, consent withdrawn, or processing unlawful. Critical privacy right.
Answer: Both A and B
GDPR requires explicit consent for special category data; ePrivacy Directive covers electronic communications. Both emphasize user control and transparency in data processing.
Answer: Differential Privacy / DP
DP-SGD adds noise to gradients during training, providing mathematical privacy guarantees. Critical for training ML models on sensitive data while preventing membership inference.
Answer: True
Model inversion exploits model confidence scores to infer sensitive attributes of training data. Mitigation: differential privacy, output perturbation, access controls.
Answer: All of these
Adversarial defenses: adversarial training includes perturbed examples, defensive distillation smooths outputs, randomized smoothing adds noise. All improve robustness against adversarial attacks.
Answer: Container / Image
Container image scanning identifies known vulnerabilities, misconfigurations, and secrets in images before deployment. Critical for secure CI/CD pipelines in cloud-native environments.
Answer: True
Service mesh (Istio, Linkerd) automatically encrypts service-to-service traffic with mTLS, provides authentication, authorization, and observability without application code changes.
Answer: All of these
Kubernetes security: Pod Security Policies restrict privileges, Network Policies control traffic, Resource Limits prevent DoS. Combined for defense-in-depth in container environments.