Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Membership inference exploits model confidence to infer training data membership. Mitigation: differential privacy, regularization, output perturbation.
Answer: Both A and B
Data poisoning injects malicious samples; backdoor attacks embed triggers that activate misclassification. Both compromise model integrity during training.
Answer: Randomized
Randomized smoothing provides certified robustness guarantees against adversarial perturbations by averaging predictions over noisy inputs.
Answer: True
Runtime security (Falco, Tetragon) monitors system calls, network activity, file access in real-time to detect threats in containerized environments.
Answer: Both A and B
Security Context defines pod/container privileges; Pod Security Standards enforce baseline/restricted policies. Both critical for container security.
Answer: IaC / Infrastructure as Code
IaC scanning (Checkov, tfsec) analyzes Terraform/CloudFormation for misconfigurations before deployment. Critical for shift-left security in DevOps.
Answer: True
SDP creates dynamic, identity-based perimeters: resources invisible until user/device authenticated and authorized. Critical for reducing attack surface.
Answer: Both A and B
Behavioral biometrics analyzes typing, mouse movements; adaptive authentication adjusts requirements based on risk. Both enable continuous verification in Zero Trust.
Answer: 800-207
NIST SP 800-207 provides comprehensive Zero Trust guidance: identity verification, device trust, network segmentation, continuous monitoring.
Answer: True
Digital India Act aims to address: platform accountability, user rights, emerging tech governance, algorithmic transparency. Complements DPDP Act and IT Rules.
Answer: Panchamrit Strategy
Panchamrit (five nectars) announced at COP26 includes: 500 GW non-fossil capacity, 50% energy from renewables, 1 billion tonne CO2 reduction, net-zero by 2070.
Answer: Chandrayaan
Chandrayaan-3's Vikram lander and Pragyan rover analyzed lunar soil near south pole, searching for water ice and studying surface composition.
Answer: True
UPI's success driven by interoperability, zero MDR, and innovation. Inspired similar systems globally: Singapore PayNow, UAE, France discussions.
Answer: Both A and B
Neuromorphic chips use spiking neurons that fire only when needed, and event-driven computation that processes only changes. Critical for edge AI with tight power budgets.
Answer: DNA / Molecular
DNA data storage offers extreme density (exabytes/gram) and longevity (thousands of years). Research ongoing at IITs and global labs for archival applications.
Answer: True
QKD uses no-cloning theorem and measurement disturbance to detect eavesdropping. Provides provable security unlike computational security of classical cryptography.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, threatening RSA encryption. Requires fault-tolerant quantum computers not yet available at scale.
Answer: Digital Personal Data Protection / DPDP
DPDP Act 2023 establishes framework for processing digital personal data in India, with rights for data principals and obligations for data fiduciaries.
Answer: True
Right to Erasure (Article 17 GDPR) allows individuals to request deletion when data is no longer necessary, consent withdrawn, or processing unlawful. Critical privacy right.
Answer: Both A and B
GDPR requires explicit consent for special category data; ePrivacy Directive covers electronic communications. Both emphasize user control and transparency in data processing.