Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: 700 MHz
Lower frequency bands (like 700 MHz) have longer wavelengths that penetrate buildings and obstacles better, providing wider coverage with fewer towers. Higher bands (3.5 GHz, 26 GHz) offer higher capacity but shorter range, requiring denser infrastructure. 5G deployments use band combinations for coverage+capacity.
Answer: Switch
Switch operates at Data Link Layer (Layer 2), using MAC addresses to forward frames to specific ports within a LAN. More efficient than hubs (broadcast to all ports). Managed switches support VLANs, QoS, and security features. Routers operate at Layer 3 using IP addresses.
Answer: USB
USB (Universal Serial Bus) is the standard port for keyboards, mice, and most peripherals. Replaced legacy PS/2 ports. USB-C offers reversible connector and higher power/data transfer. Wireless keyboards use Bluetooth or RF dongles, but USB remains universal for wired connections.
Answer: COUNT
COUNT() returns the number of rows that match a specified condition. COUNT(*) counts all rows; COUNT(column) counts non-NULL values. Used with GROUP BY for segmented counts. Other aggregates: SUM (total), AVG (mean), MIN/MAX (extremes). Essential for reporting and analytics queries.
Answer: Inherence-based
Inherence-based authentication uses biometric traits inherent to the user: fingerprint, iris, face, voice, or behavioral patterns. Part of multi-factor authentication (MFA). Advantages: hard to lose/share; challenges: privacy concerns, spoofing risks, and accessibility for disabled users.
Answer: VoIP
VoIP (Voice over Internet Protocol) transmits voice calls as data packets over IP networks (internet, LAN). Examples: WhatsApp calls, Zoom, Skype, corporate PBX. Advantages: lower cost, integration with apps, advanced features. Quality depends on bandwidth, latency, and jitter management.
Answer: All of these
Anomaly detection uses: Supervised Learning (trained on labeled attacks), Unsupervised Learning (clustering normal vs abnormal patterns), and Reinforcement Learning (adaptive response to threats). Combined approaches improve detection of zero-day attacks and reduce false positives in SIEM systems.
Answer: Multi-Bank VPA
UPI allows linking multiple bank accounts to one Virtual Payment Address (VPA). Users can select default account or choose at transaction time. Simplifies management, enables fund routing flexibility, and maintains single identity across banks. Managed securely via NPCI's central switch.
Answer: Caps Lock
Caps Lock toggles alphabetic keys to produce uppercase letters without holding Shift. Shift produces uppercase only while pressed. Caps Lock indicator (LED) shows active state. Useful for typing headings or acronyms; accidental activation is a common user frustration.
Answer: JOIN
JOIN combines rows from multiple tables using related columns (usually primary/foreign keys). Types: INNER JOIN (matching rows), LEFT/RIGHT JOIN (all rows from one side), FULL OUTER JOIN (all rows). Essential for normalized database queries retrieving related data across tables.
Answer: Disabling SSID broadcast
Disabling SSID broadcast hides network name from public scans, adding obscurity layer. However, strong security requires WPA3 encryption, complex password, MAC filtering, and regular firmware updates. WEP is broken; default passwords are easily guessable; open networks offer no protection.
Answer: UPI AutoPay
UPI AutoPay enables mandate-based recurring payments for subscriptions (OTT, utilities, mutual funds). Users set amount, frequency, and validity; payments execute automatically without manual intervention each time. Enhances convenience while maintaining security with transaction limits and notifications.
Answer: All of these
Real-time translation combines: Speech Recognition (audio to text), NLP (translation between languages), and Speech Synthesis (text to audio). Advanced systems also use context understanding and lip-sync for natural output. Used in global collaboration tools and accessibility features.
Answer: AES-256
AES-256 (Advanced Encryption Standard with 256-bit key) is approved by NIST for top-secret information. Provides strong security against brute-force attacks. DES/3DES are deprecated; RC4 has known vulnerabilities. AES is efficient in both hardware and software implementations.
Answer: UEBA
UEBA uses ML to establish behavioral baselines and detect anomalies indicating compromised accounts or insider threats.
Answer: All of these
Code LLMs (Codex, CodeLlama) trained on code repositories enable natural language to code generation. Combined with fine-tuning and prompt engineering for developer productivity tools.
Answer: True
Transparent tracking from origin to consumer.
Answer: True
Critical for net-zero pathways and climate mitigation.
Answer: True
Intended use, training data, evaluation metrics, limitations.
Answer: True
Critical for cloud security posture management.