Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
IT Rules 2021 mandate Significant Social Media Intermediaries (50L+ users) to appoint: Chief Compliance Officer, Nodal Contact Person, and Resident Grievance Officer. Also require traceability of first originator for certain messages. Critical for platform governance and compliance questions.
Answer: Lead Time for Changes
Lead Time for Changes (DORA metric) measures time from code commit to successful production deployment. Key indicator of delivery speed and process efficiency. Other DORA metrics: Deployment Frequency, Change Failure Rate, MTTR. Critical for DevOps performance questions.
Answer: ETL
ETL (Extract, Transform, Load) is foundational data integration process: extract from sources, transform (clean, enrich, aggregate), load to target (warehouse, lake). Modern variants: ELT (load first, transform later) for cloud data platforms. Critical for data pipeline questions.
Answer: Deployment
Deployment manages replica sets of pods: defines replicas, update strategy, rollback, and scaling. Ensures desired state is maintained. Pod is smallest deployable unit; Service exposes pods; ConfigMap stores configuration. Critical for Kubernetes administration questions.
Answer: True
Deception technology deploys realistic fake assets (servers, credentials, data) to lure attackers, enabling early detection, threat intelligence, and reduced dwell time. Complements prevention/detection controls. Used in enterprise security and critical infrastructure protection. Important for advanced cybersecurity questions.
Answer: Section 10
Section 10 of DPDP Act mandates Significant Data Fiduciaries (based on data volume, sensitivity, risk) to appoint DPO, conduct audits, and implement grievance redressal. Enhances accountability for high-risk data processing. Critical for compliance and governance questions.
Answer: Observability
Observability enables understanding system internal state from external outputs: metrics (Prometheus), logs (ELK), traces (Jaeger). Goes beyond monitoring by enabling debugging of unknown issues. Critical for SRE practices and cloud operations questions in technical exams.
Answer: Parquet
Parquet is a columnar storage format optimized for analytics: efficient compression, predicate pushdown, and schema evolution. Reduces I/O by reading only required columns. Used in Spark, Hive, Presto. CSV/JSON are row-oriented; XML is verbose. Critical for big data engineering questions.
Answer: True
Service mesh (Istio, Linkerd, Consul) deploys sidecar proxies to handle service-to-service communication: mTLS encryption, traffic splitting, retries, metrics, and distributed tracing. Decouples infrastructure concerns from application code. Critical for cloud-native architecture questions.
Answer: Identity Federation Attack
Identity federation attacks exploit trust between identity providers (IdP) and service providers (SP) in SSO setups. Attackers compromise IdP to gain access to multiple federated services. Mitigation: MFA, short-lived tokens, strict trust policies. Critical for cloud security architecture questions.
Answer: RBI
Reserve Bank of India (RBI) regulates payment systems under Payment and Settlement Systems Act 2007. Oversees UPI, cards, wallets, PPIs, and fintech innovations. Issues guidelines for security, interoperability, and consumer protection. Critical for banking and fintech policy questions.
Answer: All of these
CI/CD pipeline automates: Continuous Integration (code merge + testing), Continuous Delivery (release-ready artifacts), Continuous Deployment (auto-production release). Tools: Jenkins, GitLab CI, GitHub Actions. Critical for agile software delivery and DevOps questions in technical exams.
Answer: True
Data lakes (S3, ADLS) store raw structured/unstructured data for flexible analysis; data warehouses (Snowflake, Redshift) store curated, schema-on-write data for BI. Modern architectures use lakehouse pattern combining both. Critical for understanding data platform design in analytics exams.
Answer: Circuit Breaker
Circuit Breaker pattern prevents cascading failures by stopping requests to failing services temporarily, allowing recovery. Implemented in libraries like Resilience4j, Hystrix. Service mesh (Istio, Linkerd) provides infrastructure-level resilience. Critical for building fault-tolerant distributed systems.
Answer: Quantum
Post-Quantum Cryptography (PQC) develops algorithms secure against quantum attacks (Shor's algorithm). NIST is standardizing PQC algorithms (CRYSTALS-Kyber, Dilithium). Critical for future-proofing sensitive systems. India's CERT-In and DRDO actively research PQC. Important for strategic cybersecurity questions.
Answer: Digital India Act
Digital India Act (proposed) aims to replace IT Act 2000 with updated framework addressing: platform accountability, emerging tech governance, user rights, and cybercrime. Complements DPDP Act 2023. Critical for understanding India's evolving digital regulatory landscape in policy-focused exams.
Answer: True
IaC tools (Terraform, CloudFormation, Ansible) define infrastructure in declarative code files, enabling version control, peer review, automated testing, and consistent deployments across environments. Reduces configuration drift and manual errors. Critical for cloud operations and DevOps questions in technical exams.
Answer: Stream Processing
Stream Processing (Apache Kafka, Flink, Spark Streaming) processes data in real-time as it arrives, enabling instant insights for fraud detection, IoT monitoring, and live dashboards. Batch processing handles historical data; ETL transforms data for storage; data warehousing supports analytical queries. Critical for modern data architecture questions.
Answer: Kubernetes
Kubernetes (K8s) is the de facto standard for container orchestration, providing automated deployment, scaling, load balancing, and self-healing for containerized applications. Originally developed by Google, now maintained by CNCF. Essential for cloud-native architecture questions in technical exams.
Answer: True
AI/ML-powered attacks can mutate malware code, generate polymorphic phishing content, and adapt evasion techniques in real-time to bypass signature-based defenses. Requires behavioral analytics, anomaly detection, and AI-powered defense systems. Critical for understanding next-generation threat landscape in cybersecurity exams.