Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Advanced decoding: beam search explores multiple hypotheses, nucleus sampling truncates low-probability tokens. Balance diversity and coherence.
Answer: True
ITU Global Cybersecurity Index assesses national cybersecurity commitment across legal, technical, organizational, capacity building, cooperation dimensions.
Answer: True
Red teaming conducts adversarial simulations (cyber, physical, social) to identify gaps in detection, response, resilience. Distinct from vulnerability scanning.
Answer: True
Programmable CBDC allows conditional transfers for specific goods/services (food, education), enhancing policy effectiveness while requiring careful privacy design.
Answer: True
ISRU extracts water ice, electrolyzes into hydrogen/oxygen for propellant. Critical for sustainable lunar exploration and deep space missions by reducing Earth launch mass.
Answer: True
QEC codes (surface code, Shor code) protect quantum information from decoherence and noise. Critical for fault-tolerant quantum computing but requires significant qubit overhead.
Answer: True
Accountability (GDPR Article 5, DPDP Act Section 8) requires documented policies, training, audits, and breach response procedures. Critical for regulatory compliance.
Answer: True
Model extraction queries API to infer model architecture/parameters, enabling intellectual property theft or adversarial example generation. Mitigation: query rate limiting, output perturbation.
Answer: True
CWPP provides unified security for VMs, containers, serverless across AWS, Azure, GCP, on-premises. Critical for consistent security posture in hybrid cloud.
Answer: True
Continuous authentication adjusts verification requirements based on behavioral analytics, device posture, location, and other risk signals. Critical for Zero Trust security posture.
Answer: True
Stratified sampling maintains class proportions in train/test splits, critical for imbalanced classification.
Answer: True
Micro-segmentation creates granular security zones, containing breaches and limiting attacker movement.
Answer: True
Data minimization limits collection to what's necessary for specified purpose. Reduces privacy risks, storage costs, breach impact.
Answer: True
Defensive distillation trains a student model to mimic a teacher's softened outputs, reducing gradient magnitudes and adversarial vulnerability.
Answer: True
IAM systems manage user identities, authentication, authorization. Critical for implementing least privilege access controls in Zero Trust.
Answer: True
India Semiconductor Mission implements ₹76,000 crore incentive scheme for fabs, display fabs, ATMP, design. Partnerships with global players announced.
Answer: True
QEC codes (surface code, Shor code) encode logical qubits across many physical qubits to detect/correct errors. Critical for fault-tolerant quantum computing.
Answer: True
Right to Portability (GDPR Article 20) enables individuals to obtain and reuse personal data across services. Promotes competition and user control.
Answer: True
Membership inference exploits model confidence to infer training data membership. Mitigation: differential privacy, regularization, output perturbation.
Answer: True
Runtime security (Falco, Tetragon) monitors system calls, network activity, file access in real-time to detect threats in containerized environments.