Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: PMP / PRINCE2
PMP (PMI) covers traditional project management; PRINCE2 is process-based; Agile/Scrum certifications focus on iterative delivery. All valued for tech project leadership.
Answer: Chaos Engineering
Chaos Engineering (Netflix Chaos Monkey) proactively tests system resilience by injecting failures in controlled experiments. Builds confidence in fault tolerance.
Answer: True
GitOps (ArgoCD, Flux) declaratively defines desired state in Git; operators sync cluster state. Benefits: audit trail, rollback via git revert, peer review via PRs.
Answer: Code
IaC (Terraform, Ansible, CloudFormation) defines infrastructure in declarative code, enabling version control, peer review, automated testing, consistent deployments.
Answer: Both A and B
Adapter/ACL patterns wrap external APIs, translating between internal models and external interfaces. Critical for maintainable integrations and testing.
Answer: Sharding
Sharding partitions data horizontally across nodes based on key ranges or hashes, enabling horizontal scaling. Critical for handling large datasets in distributed databases.
Answer: True
Edge computing brings computation to network edge (routers, gateways), enabling real-time processing for IoT, autonomous vehicles, industrial automation. Complements cloud.
Answer: Machine
Machine Learning enables systems to learn patterns from data and improve performance on tasks without explicit programming. Types: supervised, unsupervised, reinforcement.
Answer: All of these
NIDHI-PRAYAS (DST) funds prototyping; Startup India offers tax benefits; AIM establishes incubators. Together support innovation from ideation to scale.
Answer: True
Digital twins combine IoT, AI, simulation to model physical assets: factories, cities, power grids. Enables predictive maintenance, scenario testing. Critical for Industry 4.0.
Answer: All of these
Immersive tech: VR (fully virtual), AR (overlay on real world), MR (blend virtual/real). Applications: training, education, entertainment, remote collaboration.
Answer: True
ISO 20022 defines rich, structured data standards for payments, securities, trade finance. Enables interoperability, automation, compliance. Critical for financial infrastructure modernization.
Answer: Both A and B
CIS Benchmarks provide hardening guidelines; NIST SP 800-190 covers container security lifecycle. Critical for cloud-native security.
Answer: MP / Digital India Land Records Modernisation Programme
DILRMP digitizes land records, integrates with Aadhaar, enables online mutation, reduces disputes. Critical for property rights, credit access, governance transparency.
Answer: Both A and B
OWASP API Top 10 lists common API vulnerabilities; NIST SP 800-204 provides security guidelines for microservices APIs. Critical for API security design.
Answer: DigiLocker
DigiLocker enables citizens to store/share government-issued documents digitally. Documents have legal validity under IT Act. Integrates with Aadhaar for authentication.
Answer: DID / Decentralized Identifiers
W3C DID Specification enables users to create/own identifiers without central authorities. DIDs resolve to DID Documents containing public keys and service endpoints.
Answer: Both A and B
OWASP Application Security Verification Standard (ASVS) and ISO 27034 provide frameworks for secure software development, testing, and vulnerability management.
Answer: CPGRAMS
CPGRAMS (Centralized Public Grievance Redress and Monitoring System) enables online lodging and tracking of grievances against central government ministries/departments.
Answer: True
ISO/IEC 27001 specifies ISMS requirements: risk assessment, controls, monitoring, improvement. Certification demonstrates commitment to security best practices.