GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 1421–1440 of 1561 questions
technology medium mcq

Which tool is commonly used for infrastructure provisioning using declarative configuration?

  1. Jenkins
  2. Terraform
  3. Ansible
  4. Docker
technology hard mcq

Which pattern enables gradual rollout of new features to a subset of users for testing?

  1. Blue-Green Deployment
  2. Canary Release
  3. Feature Toggles
  4. A/B Testing
technology medium mcq

Which authority adjudicates disputes under the Digital Personal Data Protection Act 2023?

  1. CERT-In
  2. Data Protection Board of India
  3. TRAI
  4. MeitY
technology medium mcq

Which data modeling approach is optimized for analytical queries with denormalized schemas?

  1. Third Normal Form
  2. Star Schema
  3. Entity-Relationship
  4. Graph Model
technology hard mcq

Which attack exploits speculative execution vulnerabilities in CPUs to leak sensitive data?

  1. Meltdown/Spectre
  2. Rowhammer
  3. BlueBorne
  4. Log4Shell
technology medium fill_blank

The regulatory framework for digital lending in India is issued by ________.

technology medium mcq

Which practice involves automatically rolling back deployments when error rates exceed thresholds?

  1. Canary Release
  2. Automated Rollback
  3. Feature Flags
  4. Chaos Engineering
technology medium mcq

Which Kubernetes resource provides stable network identity and DNS name for pods?

  1. Deployment
  2. StatefulSet
  3. DaemonSet
  4. ReplicaSet
technology hard mcq

Which CERT-In direction mandates synchronization of IT system clocks with National Time Server?

  1. Direction 12
  2. Direction 20
  3. Direction 44
  4. Direction 66
technology medium mcq

Which technology enables distributed processing of large datasets across clusters?

  1. MySQL
  2. Apache Spark
  3. MongoDB
  4. Redis
technology medium mcq

Which technique analyzes network traffic patterns to detect anomalies without known signatures?

  1. Signature-based Detection
  2. Behavioral Analytics
  3. Heuristic Analysis
  4. Sandboxing