Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Web Application / DAST
Web Application Penetration Testing (DAST - Dynamic Application Security Testing) identifies vulnerabilities: SQL injection, XSS, CSRF, auth flaws. Tools: Burp Suite, OWASP ZAP. Critical for securing digital services and compliance with security standards in banking/government exams.
Answer: Both A and B
Skyroot Aerospace (Vikram series) and Agnikul Cosmos (Agnibaan) are Indian private startups developing small launch vehicles for dedicated small satellite missions. Supported by IN-SPACe and NSIL. Represents India's emerging commercial space ecosystem. Critical for space economy questions.
Answer: True
Flow batteries (vanadium redox) store energy in liquid electrolytes; power (stack size) and energy (tank volume) are independent. Advantages: long cycle life, deep discharge, scalability for 4-12 hour storage. Critical for renewable integration and grid stability questions.
Answer: All of these
Nanomaterials enable: high surface area for drug loading, quantum effects for imaging, superparamagnetism for magnetic targeting. Applications: cancer therapy, diagnostics, tissue engineering. India's Nano Mission supports research. Critical for nanotechnology and healthcare innovation questions.
Answer: Gate-All-Around / GAA
GAA (Gate-All-Around) transistors (MBCFET, Nanosheet) surround channel with gate on all sides, improving electrostatic control vs FinFET at sub-3nm nodes. Enables continued scaling per Moore's Law. Critical for understanding semiconductor innovation roadmap questions.
Answer: Reconnaissance
Reconnaissance (information gathering) is first phase of pentest: passive (OSINT, WHOIS) and active (scanning, enumeration) techniques to map target attack surface. Followed by scanning, exploitation, post-exploitation, and reporting. Critical for cybersecurity methodology questions.
Answer: True
Indian Space Policy 2023 enables private sector participation across space value chain: satellite manufacturing, launch services, ground infrastructure, and applications. IN-SPACe acts as single-window regulator. Critical for understanding India's space sector liberalization and economic potential.
Answer: Solid-State Battery
Solid-State Batteries replace flammable liquid electrolytes with solid ceramics/polymers, enabling: higher energy density, faster charging, wider temperature range, and reduced fire risk. Key for EVs and grid storage. India's ACC PLI scheme supports domestic manufacturing. Critical for clean energy questions.
Answer: Graphene
Graphene is a single-atom-thick layer of carbon atoms in hexagonal lattice. Properties: 200x stronger than steel, excellent electrical/thermal conductivity, flexible. Applications: electronics, composites, energy storage, sensors. India has research initiatives at IITs and C-MET. Critical for materials science questions.
Answer: True
India Semiconductor Mission (under MeitY) implements ₹76,000 crore incentive scheme for fabs, display fabs, ATMP, and design. Partnerships with global players (TSMC, Micron) announced. Aims to build strategic self-reliance in critical electronics supply chain. Critical for industrial policy questions.
Answer: 3nm
As of 2026, 3nm process node is in high-volume production (TSMC, Samsung) for flagship mobile and HPC chips. 2nm is in risk production with GAA transistors. India's semiconductor mission targets mature nodes (28nm-65nm) initially for strategic autonomy. Critical for understanding tech competitiveness questions.
Answer: All of these
IaC (Terraform), Configuration Management (Ansible), and GitOps all use version-controlled code to define infrastructure/app state. Enables: repeatability, auditability, peer review, and automated testing. Critical for modern DevOps practices and cloud operations questions.
Answer: True
Data Mesh treats data as a product: domain teams own data products, with self-serve infrastructure and federated governance. Addresses scalability limits of centralized data teams. Principles: domain ownership, data as product, self-serve platform, federated governance. Critical for modern data architecture questions.
Answer: ConfigMap
ConfigMap stores configuration data (environment variables, config files) as key-value pairs for pods. Secret is for sensitive data (base64-encoded); PersistentVolume for storage; Namespace for resource isolation. Critical for Kubernetes configuration management questions.
Answer: Classification
Data Classification categorizes data (Public, Internal, Confidential, Restricted) to apply appropriate security controls: encryption, access restrictions, retention policies. Foundation of data protection programs. Critical for compliance (DPDP, GDPR) and information security questions.
Answer: Section 66
Section 66 prescribes punishment (up to 3 years + fine) for computer-related offenses: unauthorized access, data theft, introducing viruses. Section 43 covers civil liability; 66C is identity theft; 67 is obscene content. Critical for cyber law awareness in exams.
Answer: True
GitOps (ArgoCD, Flux) declaratively defines desired state in Git; operators sync cluster state to match. Benefits: audit trail, rollback via git revert, peer review via PRs. Critical for modern cloud-native deployment practices and infrastructure management questions.
Answer: Validity
Validity ensures data conforms to business rules, formats, and value ranges (e.g., email format, date ranges). Other dimensions: Accuracy (correctness), Completeness (no missing values), Consistency (across systems). Critical for data governance and quality management questions.
Answer: kube-scheduler
kube-scheduler assigns pods to nodes based on resource requests, constraints (node selectors, taints), and policies. Works with kubelet (node agent) and API server. Critical for understanding Kubernetes control plane architecture in cloud exams.
Answer: Homomorphic Encryption
Homomorphic Encryption allows computations on ciphertext, producing encrypted results that decrypt to correct output. Enables privacy-preserving cloud analytics, secure voting, and confidential AI. Still computationally intensive but advancing with research. Critical for privacy-enhancing technologies.