Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
SDP creates dynamic, identity-based perimeters: resources invisible until user/device authenticated and authorized. Critical for reducing attack surface.
Answer: True
Digital India Act aims to address: platform accountability, user rights, emerging tech governance, algorithmic transparency. Complements DPDP Act and IT Rules.
Answer: True
UPI's success driven by interoperability, zero MDR, and innovation. Inspired similar systems globally: Singapore PayNow, UAE, France discussions.
Answer: True
QKD uses no-cloning theorem and measurement disturbance to detect eavesdropping. Provides provable security unlike computational security of classical cryptography.
Answer: True
Right to Erasure (Article 17 GDPR) allows individuals to request deletion when data is no longer necessary, consent withdrawn, or processing unlawful. Critical privacy right.
Answer: True
Model inversion exploits model confidence scores to infer sensitive attributes of training data. Mitigation: differential privacy, output perturbation, access controls.
Answer: True
Service mesh (Istio, Linkerd) automatically encrypts service-to-service traffic with mTLS, provides authentication, authorization, and observability without application code changes.
Answer: True
Micro-segmentation creates granular security policies around individual workloads/applications, containing breaches and preventing attackers from moving laterally across the network.
Answer: True
Fine-tuning updates weights on task-specific data.
Answer: True
Feature engineering: transformations, interactions, encoding.
Answer: True
Data lakes store raw data; warehouses store curated data.
Answer: True
CDC streams database operations for real-time analytics.
Answer: True
IOCs are forensic artifacts for proactive blocking.
Answer: True
IaC scanners analyze Terraform/CloudFormation for issues.
Answer: True
Micro-segmentation creates granular security zones.
Answer: True
NEP 2020 emphasizes computational thinking from Class 6 onwards.
Answer: False
DPDP Act provisions are being notified in phases.
Answer: True
ISO/IEC 27001 specifies ISMS requirements: risk assessment, controls.
Answer: True
Documents issued through DigiLocker are legally valid under IT Act, 2000.
Answer: True
Feature stores manage feature engineering, versioning, serving.