Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Device Posture
Device posture assessment evaluates endpoint security: OS patches, antivirus status, encryption, compliance. Critical for Zero Trust access decisions in hybrid environments.
Answer: True
Micro-segmentation creates granular security policies around individual workloads/applications, containing breaches and preventing attackers from moving laterally across the network.
Answer: All of these
Zero Trust combines: never trust always verify (continuous authentication), assume breach (detect/contain threats), least privilege (minimum access). All principles work together for comprehensive security.
Answer: Thought
Chain-of-Thought prompting generates reasoning steps.
Answer: True
Fine-tuning updates weights on task-specific data.
Answer: Transformer
Transformer uses self-attention for parallel sequence processing.
Answer: Clustering
Clustering discovers natural groupings in unlabeled data.
Answer: True
Feature engineering: transformations, interactions, encoding.
Answer: Time Series Forecasting
Time series forecasting models temporal patterns.
Answer: Serverless
Serverless query engines query object storage directly.
Answer: True
Data lakes store raw data; warehouses store curated data.
Answer: Parquet
Parquet is columnar storage optimized for analytics.
Answer: Stream
Stream processing handles continuous data flows.
Answer: True
CDC streams database operations for real-time analytics.
Answer: All of these
Kafka, Flink, Spark Streaming enable real-time analytics.
Answer: Hunting
Threat hunting uses hypotheses and analytics to find hidden adversaries.
Answer: True
IOCs are forensic artifacts for proactive blocking.
Answer: Both A and B
STIX/TAXII standardizes exchange; MITRE ATT&CK catalogs TTPs.
Answer: End-to-End
End-to-end encryption protects data throughout lifecycle.
Answer: True
IaC scanners analyze Terraform/CloudFormation for issues.