Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Heap
Heap (specifically binary heap) efficiently implements priority queue with O(log n) insertion and extraction of highest/lowest priority element. Arrays/lists require O(n) search for priority element. Heaps maintain partial order: parent node has higher/lower priority than children. Used in scheduling, Dijkstra's algorithm, and event simulation.
Answer: Response
Instruction tuning fine-tunes LLMs on instruction datasets, improving task completion and helpfulness.
Answer: True
Post-incident review captures lessons learned: what happened, response effectiveness, root causes, improvements. Critical for continuous security program maturity.
Answer: SDSC-SHAR
Satish Dhawan Space Centre (SDSC-SHAR) in Andhra Pradesh is ISRO's primary launch port. Handles PSLV, GSLV, SSLV, and future human spaceflight launches.
Answer: Both A and B
Spiking neurons fire only when needed; event-driven processing handles only changes. Combined enable orders-of-magnitude better energy efficiency than GPUs for edge AI.
Answer: Grover's Algorithm
Grover's Algorithm searches unsorted database of N items in O(√N) queries vs O(N) classically. Applications: optimization, cryptography, machine learning enhancement.
Answer: Both A and B
GDPR Article 35 and DPDP Act Section 10 require DPIAs for processing likely to result in high risk to individuals' rights. Critical for privacy-by-design compliance.
Answer: Backdoor Attack
Backdoor attacks inject malicious patterns during training that cause targeted misclassification when trigger present. Critical threat requiring robust training data validation.
Answer: All of these
Comprehensive cloud security: IaC scanning (Terraform, CloudFormation), container image scanning, runtime protection (Falco, Tetragon). Combined for defense-in-depth.
Answer: Both A and B
Software-Defined Perimeter (SDP) creates identity-based perimeters; micro-segmentation isolates workloads. Both implement Zero Trust by limiting access to authenticated, authorized entities only.
Answer: Business
A/B testing randomly assigns users to model variants, measuring metrics like conversion, engagement.
Answer: PM-WANI
PM-WANI enables public Wi-Fi hotspots via Public Data Offices using satellite/fiber backhaul. Aims to provide affordable internet in rural/remote areas.
Answer: All of these
Leading qubit implementations: superconducting (IBM, Google), trapped ions (IonQ), photonic (Xanadu). Each has trade-offs in coherence, scalability, error rates.
Answer: GDPR
GDPR Article 33 requires breach notification to supervisory authority within 72 hours of awareness. Critical for incident response compliance.
Answer: Both A and B
Data poisoning injects malicious samples; backdoor attacks embed triggers that activate misclassification. Both compromise model integrity during training.
Answer: Both A and B
Security Context defines pod/container privileges; Pod Security Standards enforce baseline/restricted policies. Both critical for container security.
Answer: Both A and B
Behavioral biometrics analyzes typing, mouse movements; adaptive authentication adjusts requirements based on risk. Both enable continuous verification in Zero Trust.
Answer: Panchamrit Strategy
Panchamrit (five nectars) announced at COP26 includes: 500 GW non-fossil capacity, 50% energy from renewables, 1 billion tonne CO2 reduction, net-zero by 2070.
Answer: Both A and B
Neuromorphic chips use spiking neurons that fire only when needed, and event-driven computation that processes only changes. Critical for edge AI with tight power budgets.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, threatening RSA encryption. Requires fault-tolerant quantum computers not yet available at scale.