GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 641–660 of 710 questions
technology medium mcq

Which practice involves defining infrastructure and configuration in version-controlled code files?

  1. Infrastructure as Code
  2. Configuration Management
  3. GitOps
  4. All of these
technology medium mcq

Which Kubernetes object stores non-confidential configuration data for pods to consume?

  1. Secret
  2. ConfigMap
  3. PersistentVolume
  4. Namespace
technology medium mcq

Which data quality dimension ensures data values conform to defined formats and ranges?

  1. Accuracy
  2. Completeness
  3. Validity
  4. Consistency
technology medium mcq

Which technique encrypts data in use, enabling computation on encrypted data without decryption?

  1. Homomorphic Encryption
  2. Format-Preserving Encryption
  3. Tokenization
  4. Data Masking
technology medium mcq

Which tool is commonly used for infrastructure provisioning using declarative configuration?

  1. Jenkins
  2. Terraform
  3. Ansible
  4. Docker
technology hard mcq

Which pattern enables gradual rollout of new features to a subset of users for testing?

  1. Blue-Green Deployment
  2. Canary Release
  3. Feature Toggles
  4. A/B Testing
technology medium mcq

Which authority adjudicates disputes under the Digital Personal Data Protection Act 2023?

  1. CERT-In
  2. Data Protection Board of India
  3. TRAI
  4. MeitY
technology medium mcq

Which data modeling approach is optimized for analytical queries with denormalized schemas?

  1. Third Normal Form
  2. Star Schema
  3. Entity-Relationship
  4. Graph Model
technology hard mcq

Which attack exploits speculative execution vulnerabilities in CPUs to leak sensitive data?

  1. Meltdown/Spectre
  2. Rowhammer
  3. BlueBorne
  4. Log4Shell
technology medium mcq

Which practice involves automatically rolling back deployments when error rates exceed thresholds?

  1. Canary Release
  2. Automated Rollback
  3. Feature Flags
  4. Chaos Engineering
technology medium mcq

Which Kubernetes resource provides stable network identity and DNS name for pods?

  1. Deployment
  2. StatefulSet
  3. DaemonSet
  4. ReplicaSet
technology hard mcq

Which CERT-In direction mandates synchronization of IT system clocks with National Time Server?

  1. Direction 12
  2. Direction 20
  3. Direction 44
  4. Direction 66
technology medium mcq

Which technology enables distributed processing of large datasets across clusters?

  1. MySQL
  2. Apache Spark
  3. MongoDB
  4. Redis
technology medium mcq

Which technique analyzes network traffic patterns to detect anomalies without known signatures?

  1. Signature-based Detection
  2. Behavioral Analytics
  3. Heuristic Analysis
  4. Sandboxing
technology medium mcq

Which metric measures the time from code commit to production deployment?

  1. Mean Time to Recovery
  2. Deployment Frequency
  3. Lead Time for Changes
  4. Change Failure Rate
technology medium mcq

Which Kubernetes object defines the desired state for a set of identical pods?

  1. Pod
  2. Service
  3. Deployment
  4. ConfigMap
technology hard mcq

Which data format is most efficient for columnar storage and analytics workloads?

  1. CSV
  2. JSON
  3. Parquet
  4. XML
technology medium mcq

Which attack exploits trust relationships between cloud services to escalate privileges?

  1. Phishing
  2. Cloud Jacking
  3. Identity Federation Attack
  4. API Abuse