UPSC Editorials Quiz : 23 January 2026
Kartavya Desk Staff
Introducing QUED – Questions from Editorials (UPSC Editorials Quiz) , an innovative initiative from InsightsIAS. Considering the significant number of questions in previous UPSC Prelims from editorials, practicing MCQs from this perspective can provide an extra edge. While we cover important editorials separately in our Editorial Section and SECURE Initiative, adding QUED (UPSC Editorials Quiz) to your daily MCQ practice alongside Static Quiz, Current Affairs Quiz, and InstaDART can be crucial for better performance. We recommend utilizing this initiative to enhance your preparation, with 5 MCQs posted daily at 11 am from Monday to Saturday on our website under the QUIZ menu.
#### Quiz-summary
0 of 5 questions completed
Questions:
#### Information
Best of luck! 🙂
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
#### Categories
• Not categorized 0%
• Question 1 of 5 1. Question Which of the following global and Indian legal frameworks provide protection to Olive Ridley turtles? Wildlife Protection Act, 1972 Convention on International Trade in Endangered Species (CITES) United Nations Convention on the Law of the Sea (UNCLOS) Ramsar Convention on Wetlands Select the correct answer using the code given below: (a) 1 and 2 only (b) 1, 3, and 4 only (c) 1, 2 and 3 only (d) 1, 2, 3 and 4 Correct Solution: C Statement 1 is correct: Olive Ridley turtles are listed under Schedule I of the Wildlife Protection Act, 1972, granting them the highest level of protection in India. Statement 2 is correct: They are included in Appendix I of CITES, meaning international trade in Olive Ridley turtles and their products is prohibited. Statement 3 is correct: UNCLOS obligates countries to conserve and manage marine species, indirectly protecting sea turtles. Statement 4 is incorrect: Ramsar Convention deals with wetlands, not marine turtle conservation. Incorrect Solution: C Statement 1 is correct: Olive Ridley turtles are listed under Schedule I of the Wildlife Protection Act, 1972, granting them the highest level of protection in India. Statement 2 is correct: They are included in Appendix I of CITES, meaning international trade in Olive Ridley turtles and their products is prohibited. Statement 3 is correct: UNCLOS obligates countries to conserve and manage marine species, indirectly protecting sea turtles. Statement 4 is incorrect: Ramsar Convention deals with wetlands, not marine turtle conservation.
#### 1. Question
Which of the following global and Indian legal frameworks provide protection to Olive Ridley turtles?
• Wildlife Protection Act, 1972
• Convention on International Trade in Endangered Species (CITES)
• United Nations Convention on the Law of the Sea (UNCLOS)
• Ramsar Convention on Wetlands
Select the correct answer using the code given below:
• (a) 1 and 2 only
• (b) 1, 3, and 4 only
• (c) 1, 2 and 3 only
• (d) 1, 2, 3 and 4
Solution: C
Statement 1 is correct: Olive Ridley turtles are listed under Schedule I of the Wildlife Protection Act, 1972, granting them the highest level of protection in India.
Statement 2 is correct: They are included in Appendix I of CITES, meaning international trade in Olive Ridley turtles and their products is prohibited.
Statement 3 is correct: UNCLOS obligates countries to conserve and manage marine species, indirectly protecting sea turtles.
Statement 4 is incorrect: Ramsar Convention deals with wetlands, not marine turtle conservation.
Solution: C
Statement 1 is correct: Olive Ridley turtles are listed under Schedule I of the Wildlife Protection Act, 1972, granting them the highest level of protection in India.
Statement 2 is correct: They are included in Appendix I of CITES, meaning international trade in Olive Ridley turtles and their products is prohibited.
Statement 3 is correct: UNCLOS obligates countries to conserve and manage marine species, indirectly protecting sea turtles.
Statement 4 is incorrect: Ramsar Convention deals with wetlands, not marine turtle conservation.
• Question 2 of 5 2. Question Consider the following statements regarding the Public Accounts Committee (PAC): The PAC was first introduced in India under the Government of India Act, 1935. The Chairman of the PAC is always from the ruling party in the Lok Sabha. PAC examines the Appropriation Accounts and Finance Accounts of the government along with CAG Reports. How many of the above statements is/are incorrect? a) Only one b) Only two c) All three d) None Correct Solution: B Statement 1 is incorrect: The PAC was introduced in 1921, after the Montagu-Chelmsford Reforms (Government of India Act, 1919), not in 1935. Statement 2 is incorrect: The Chairman of the PAC is from the Opposition, not the ruling party, by parliamentary convention since 1967. Statement 3 is correct: The PAC examines Appropriation Accounts, Finance Accounts, and CAG Reports, ensuring public expenditure accountability. About Public Accounts Committee (PAC): Establishment: Introduced in 1921after the Government of India Act, 1919 (Montford Reforms). Constituted annually under Rule 308 of the Rules of Procedure and Conduct of Business in Lok Sabha. Composition and Membership: Comprises 22 members: 15 members elected from Lok Sabhaby the Speaker. 7 members elected from Rajya Sabhaby the Chairman. Tenure: One year. Ministers are not eligibleto be members. Appointment of Chairman: Appointed by the Lok Sabha Speaker. By convention, the chairman belongs to the opposition party. Functions and Responsibilities: Examines government expendituresto ensure funds allocated by Parliament are used within the approved scope of demand. Scrutinizes: Appropriation accounts and finance accountsof the government. CAG Reportson revenue, expenditure, and autonomous bodies. Evaluates cases of overspending, misallocation, and financial irregularities. Holds the executive accountablefor financial discipline. Incorrect Solution: B Statement 1 is incorrect: The PAC was introduced in 1921, after the Montagu-Chelmsford Reforms (Government of India Act, 1919), not in 1935. Statement 2 is incorrect: The Chairman of the PAC is from the Opposition, not the ruling party, by parliamentary convention since 1967. Statement 3 is correct: The PAC examines Appropriation Accounts, Finance Accounts, and CAG Reports, ensuring public expenditure accountability. About Public Accounts Committee (PAC): Establishment: Introduced in 1921after the Government of India Act, 1919 (Montford Reforms). Constituted annually under Rule 308 of the Rules of Procedure and Conduct of Business in Lok Sabha. Composition and Membership: Comprises 22 members: 15 members elected from Lok Sabhaby the Speaker. 7 members elected from Rajya Sabhaby the Chairman. Tenure: One year. Ministers are not eligibleto be members. Appointment of Chairman: Appointed by the Lok Sabha Speaker. By convention, the chairman belongs to the opposition party. Functions and Responsibilities: Examines government expendituresto ensure funds allocated by Parliament are used within the approved scope of demand. Scrutinizes: Appropriation accounts and finance accountsof the government. CAG Reportson revenue, expenditure, and autonomous bodies. Evaluates cases of overspending, misallocation, and financial irregularities. Holds the executive accountablefor financial discipline.
#### 2. Question
Consider the following statements regarding the Public Accounts Committee (PAC):
• The PAC was first introduced in India under the Government of India Act, 1935.
• The Chairman of the PAC is always from the ruling party in the Lok Sabha.
• PAC examines the Appropriation Accounts and Finance Accounts of the government along with CAG Reports.
How many of the above statements is/are incorrect?
• a) Only one
• b) Only two
• c) All three
Solution: B
Statement 1 is incorrect: The PAC was introduced in 1921, after the Montagu-Chelmsford Reforms (Government of India Act, 1919), not in 1935.
Statement 2 is incorrect: The Chairman of the PAC is from the Opposition, not the ruling party, by parliamentary convention since 1967.
Statement 3 is correct: The PAC examines Appropriation Accounts, Finance Accounts, and CAG Reports, ensuring public expenditure accountability.
About Public Accounts Committee (PAC):
• Establishment: Introduced in 1921after the Government of India Act, 1919 (Montford Reforms). Constituted annually under Rule 308 of the Rules of Procedure and Conduct of Business in Lok Sabha.
• Introduced in 1921after the Government of India Act, 1919 (Montford Reforms).
• Constituted annually under Rule 308 of the Rules of Procedure and Conduct of Business in Lok Sabha.
• Composition and Membership: Comprises 22 members: 15 members elected from Lok Sabhaby the Speaker. 7 members elected from Rajya Sabhaby the Chairman. Tenure: One year. Ministers are not eligibleto be members.
• Comprises 22 members: 15 members elected from Lok Sabhaby the Speaker. 7 members elected from Rajya Sabhaby the Chairman.
• 15 members elected from Lok Sabhaby the Speaker.
• 7 members elected from Rajya Sabhaby the Chairman.
• Tenure: One year.
• Ministers are not eligibleto be members.
• Appointment of Chairman: Appointed by the Lok Sabha Speaker. By convention, the chairman belongs to the opposition party.
• Appointed by the Lok Sabha Speaker.
• By convention, the chairman belongs to the opposition party.
• Functions and Responsibilities: Examines government expendituresto ensure funds allocated by Parliament are used within the approved scope of demand. Scrutinizes: Appropriation accounts and finance accountsof the government. CAG Reportson revenue, expenditure, and autonomous bodies. Evaluates cases of overspending, misallocation, and financial irregularities. Holds the executive accountablefor financial discipline.
• Examines government expendituresto ensure funds allocated by Parliament are used within the approved scope of demand.
• Scrutinizes: Appropriation accounts and finance accountsof the government. CAG Reportson revenue, expenditure, and autonomous bodies.
• Appropriation accounts and finance accountsof the government.
• CAG Reportson revenue, expenditure, and autonomous bodies.
• Evaluates cases of overspending, misallocation, and financial irregularities.
• Holds the executive accountablefor financial discipline.
Solution: B
Statement 1 is incorrect: The PAC was introduced in 1921, after the Montagu-Chelmsford Reforms (Government of India Act, 1919), not in 1935.
Statement 2 is incorrect: The Chairman of the PAC is from the Opposition, not the ruling party, by parliamentary convention since 1967.
Statement 3 is correct: The PAC examines Appropriation Accounts, Finance Accounts, and CAG Reports, ensuring public expenditure accountability.
About Public Accounts Committee (PAC):
• Establishment: Introduced in 1921after the Government of India Act, 1919 (Montford Reforms). Constituted annually under Rule 308 of the Rules of Procedure and Conduct of Business in Lok Sabha.
• Introduced in 1921after the Government of India Act, 1919 (Montford Reforms).
• Constituted annually under Rule 308 of the Rules of Procedure and Conduct of Business in Lok Sabha.
• Composition and Membership: Comprises 22 members: 15 members elected from Lok Sabhaby the Speaker. 7 members elected from Rajya Sabhaby the Chairman. Tenure: One year. Ministers are not eligibleto be members.
• Comprises 22 members: 15 members elected from Lok Sabhaby the Speaker. 7 members elected from Rajya Sabhaby the Chairman.
• 15 members elected from Lok Sabhaby the Speaker.
• 7 members elected from Rajya Sabhaby the Chairman.
• Tenure: One year.
• Ministers are not eligibleto be members.
• Appointment of Chairman: Appointed by the Lok Sabha Speaker. By convention, the chairman belongs to the opposition party.
• Appointed by the Lok Sabha Speaker.
• By convention, the chairman belongs to the opposition party.
• Functions and Responsibilities: Examines government expendituresto ensure funds allocated by Parliament are used within the approved scope of demand. Scrutinizes: Appropriation accounts and finance accountsof the government. CAG Reportson revenue, expenditure, and autonomous bodies. Evaluates cases of overspending, misallocation, and financial irregularities. Holds the executive accountablefor financial discipline.
• Examines government expendituresto ensure funds allocated by Parliament are used within the approved scope of demand.
• Scrutinizes: Appropriation accounts and finance accountsof the government. CAG Reportson revenue, expenditure, and autonomous bodies.
• Appropriation accounts and finance accountsof the government.
• CAG Reportson revenue, expenditure, and autonomous bodies.
• Evaluates cases of overspending, misallocation, and financial irregularities.
• Holds the executive accountablefor financial discipline.
• Question 3 of 5 3. Question What is the primary mechanism of action for an mRNA-based cancer vaccine? (a) It activates dormant cancer-fighting bacteria in the gut microbiome (b) It modifies the patient’s DNA to resist cancer cell growth (c) It injects synthetic antibodies that target cancerous cells (d) It delivers mRNA to cells, instructing them to produce tumor-specific antigens Correct Solution: D mRNA-based cancer vaccines work by delivering mRNA molecules into cells, instructing them to produce antigens that trigger an immune response against tumors. Option (a) is incorrect: No mRNA vaccine targets gut bacteria for cancer treatment. Option (b) is incorrect: mRNA vaccines do not modify DNA; they work at the transcription level. Option (c) is incorrect: These vaccines do not inject antibodies; they stimulate the body’s immune system to generate its own response. What is an mRNA-Based Cancer Vaccine? An mRNA (messenger RNA) vaccine provides genetic instructions to the body’s cells, enabling them to produce antigens that trigger an immune response. Unlike traditional vaccines, these are not preventive but are used to treat existing cancer patients by targeting tumor-specific antigens. How Does it Work? Trains the Immune System: The vaccine delivers genetic instructions to produce proteins resembling tumor antigens, prompting the immune system to attack cancer cells. Personalized Treatment: Designed to target specific cancer markers in individual patients, improving precision and effectiveness. Lower Side Effects: Unlike chemotherapy, it kills only cancer cells, reducing damage to healthy tissues. Potential Multi-Antigen Targeting: Unlike the COVID-19 mRNA vaccine, which targets one antigen, cancer mRNA vaccines can target multiple tumor markers. Other mRNA Vaccines for Cancer: UK’s Cancer Vaccine Launch Pad (2023): Aims to accelerate clinical trials for personalized cancer immunotherapy. CureVac’s CVGBM Vaccine (USA, 2023): Shows promising immune response in glioblastoma (brain cancer) patients. Significance of mRNA-Based Cancer Vaccine: Breakthrough in Cancer Treatment: Represents a new era of immunotherapy, offering a targeted and personalized approach to cancer treatment. Precision Medicine Advancement: Unlike conventional chemotherapy, mRNA vaccines are tailored to individual patients, enhancing effectiveness and reducing side effects. Potential for Multi-Cancer Application: Can be adapted to various cancer types by targeting multiple tumor antigens, making it a versatile treatment option. Improved Immune Response: Boosts the body’s natural defense mechanism, helping it recognize and destroy cancer cells more effectively. Incorrect Solution: D mRNA-based cancer vaccines work by delivering mRNA molecules into cells, instructing them to produce antigens that trigger an immune response against tumors. Option (a) is incorrect: No mRNA vaccine targets gut bacteria for cancer treatment. Option (b) is incorrect: mRNA vaccines do not modify DNA; they work at the transcription level. Option (c) is incorrect: These vaccines do not inject antibodies; they stimulate the body’s immune system to generate its own response. What is an mRNA-Based Cancer Vaccine? An mRNA (messenger RNA) vaccine provides genetic instructions to the body’s cells, enabling them to produce antigens that trigger an immune response. Unlike traditional vaccines, these are not preventive but are used to treat existing cancer patients by targeting tumor-specific antigens. How Does it Work? Trains the Immune System: The vaccine delivers genetic instructions to produce proteins resembling tumor antigens, prompting the immune system to attack cancer cells. Personalized Treatment: Designed to target specific cancer markers in individual patients, improving precision and effectiveness. Lower Side Effects: Unlike chemotherapy, it kills only cancer cells, reducing damage to healthy tissues. Potential Multi-Antigen Targeting: Unlike the COVID-19 mRNA vaccine, which targets one antigen, cancer mRNA vaccines can target multiple tumor markers. Other mRNA Vaccines for Cancer: UK’s Cancer Vaccine Launch Pad (2023): Aims to accelerate clinical trials for personalized cancer immunotherapy. CureVac’s CVGBM Vaccine (USA, 2023): Shows promising immune response in glioblastoma (brain cancer) patients. Significance of mRNA-Based Cancer Vaccine: Breakthrough in Cancer Treatment: Represents a new era of immunotherapy, offering a targeted and personalized approach to cancer treatment. Precision Medicine Advancement: Unlike conventional chemotherapy, mRNA vaccines are tailored to individual patients, enhancing effectiveness and reducing side effects. Potential for Multi-Cancer Application: Can be adapted to various cancer types by targeting multiple tumor antigens, making it a versatile treatment option. Improved Immune Response: Boosts the body’s natural defense mechanism, helping it recognize and destroy cancer cells more effectively.
#### 3. Question
What is the primary mechanism of action for an mRNA-based cancer vaccine?
• (a) It activates dormant cancer-fighting bacteria in the gut microbiome
• (b) It modifies the patient’s DNA to resist cancer cell growth
• (c) It injects synthetic antibodies that target cancerous cells
• (d) It delivers mRNA to cells, instructing them to produce tumor-specific antigens
Solution: D
mRNA-based cancer vaccines work by delivering mRNA molecules into cells, instructing them to produce antigens that trigger an immune response against tumors.
Option (a) is incorrect: No mRNA vaccine targets gut bacteria for cancer treatment.
Option (b) is incorrect: mRNA vaccines do not modify DNA; they work at the transcription level.
Option (c) is incorrect: These vaccines do not inject antibodies; they stimulate the body’s immune system to generate its own response.
• What is an mRNA-Based Cancer Vaccine?
• An mRNA (messenger RNA) vaccine provides genetic instructions to the body’s cells, enabling them to produce antigens that trigger an immune response. Unlike traditional vaccines, these are not preventive but are used to treat existing cancer patients by targeting tumor-specific antigens.
• An mRNA (messenger RNA) vaccine provides genetic instructions to the body’s cells, enabling them to produce antigens that trigger an immune response.
• Unlike traditional vaccines, these are not preventive but are used to treat existing cancer patients by targeting tumor-specific antigens.
• How Does it Work? Trains the Immune System: The vaccine delivers genetic instructions to produce proteins resembling tumor antigens, prompting the immune system to attack cancer cells. Personalized Treatment: Designed to target specific cancer markers in individual patients, improving precision and effectiveness. Lower Side Effects: Unlike chemotherapy, it kills only cancer cells, reducing damage to healthy tissues. Potential Multi-Antigen Targeting: Unlike the COVID-19 mRNA vaccine, which targets one antigen, cancer mRNA vaccines can target multiple tumor markers.
• Trains the Immune System: The vaccine delivers genetic instructions to produce proteins resembling tumor antigens, prompting the immune system to attack cancer cells.
• Personalized Treatment: Designed to target specific cancer markers in individual patients, improving precision and effectiveness.
• Lower Side Effects: Unlike chemotherapy, it kills only cancer cells, reducing damage to healthy tissues.
• Potential Multi-Antigen Targeting: Unlike the COVID-19 mRNA vaccine, which targets one antigen, cancer mRNA vaccines can target multiple tumor markers.
• Other mRNA Vaccines for Cancer: UK’s Cancer Vaccine Launch Pad (2023): Aims to accelerate clinical trials for personalized cancer immunotherapy. CureVac’s CVGBM Vaccine (USA, 2023): Shows promising immune response in glioblastoma (brain cancer) patients.
• UK’s Cancer Vaccine Launch Pad (2023): Aims to accelerate clinical trials for personalized cancer immunotherapy.
• CureVac’s CVGBM Vaccine (USA, 2023): Shows promising immune response in glioblastoma (brain cancer) patients.
Significance of mRNA-Based Cancer Vaccine:
• Breakthrough in Cancer Treatment: Represents a new era of immunotherapy, offering a targeted and personalized approach to cancer treatment.
• Precision Medicine Advancement: Unlike conventional chemotherapy, mRNA vaccines are tailored to individual patients, enhancing effectiveness and reducing side effects.
• Potential for Multi-Cancer Application: Can be adapted to various cancer types by targeting multiple tumor antigens, making it a versatile treatment option.
• Improved Immune Response: Boosts the body’s natural defense mechanism, helping it recognize and destroy cancer cells more effectively.
Solution: D
mRNA-based cancer vaccines work by delivering mRNA molecules into cells, instructing them to produce antigens that trigger an immune response against tumors.
Option (a) is incorrect: No mRNA vaccine targets gut bacteria for cancer treatment.
Option (b) is incorrect: mRNA vaccines do not modify DNA; they work at the transcription level.
Option (c) is incorrect: These vaccines do not inject antibodies; they stimulate the body’s immune system to generate its own response.
• What is an mRNA-Based Cancer Vaccine?
• An mRNA (messenger RNA) vaccine provides genetic instructions to the body’s cells, enabling them to produce antigens that trigger an immune response. Unlike traditional vaccines, these are not preventive but are used to treat existing cancer patients by targeting tumor-specific antigens.
• An mRNA (messenger RNA) vaccine provides genetic instructions to the body’s cells, enabling them to produce antigens that trigger an immune response.
• Unlike traditional vaccines, these are not preventive but are used to treat existing cancer patients by targeting tumor-specific antigens.
• How Does it Work? Trains the Immune System: The vaccine delivers genetic instructions to produce proteins resembling tumor antigens, prompting the immune system to attack cancer cells. Personalized Treatment: Designed to target specific cancer markers in individual patients, improving precision and effectiveness. Lower Side Effects: Unlike chemotherapy, it kills only cancer cells, reducing damage to healthy tissues. Potential Multi-Antigen Targeting: Unlike the COVID-19 mRNA vaccine, which targets one antigen, cancer mRNA vaccines can target multiple tumor markers.
• Trains the Immune System: The vaccine delivers genetic instructions to produce proteins resembling tumor antigens, prompting the immune system to attack cancer cells.
• Personalized Treatment: Designed to target specific cancer markers in individual patients, improving precision and effectiveness.
• Lower Side Effects: Unlike chemotherapy, it kills only cancer cells, reducing damage to healthy tissues.
• Potential Multi-Antigen Targeting: Unlike the COVID-19 mRNA vaccine, which targets one antigen, cancer mRNA vaccines can target multiple tumor markers.
• Other mRNA Vaccines for Cancer: UK’s Cancer Vaccine Launch Pad (2023): Aims to accelerate clinical trials for personalized cancer immunotherapy. CureVac’s CVGBM Vaccine (USA, 2023): Shows promising immune response in glioblastoma (brain cancer) patients.
• UK’s Cancer Vaccine Launch Pad (2023): Aims to accelerate clinical trials for personalized cancer immunotherapy.
• CureVac’s CVGBM Vaccine (USA, 2023): Shows promising immune response in glioblastoma (brain cancer) patients.
Significance of mRNA-Based Cancer Vaccine:
• Breakthrough in Cancer Treatment: Represents a new era of immunotherapy, offering a targeted and personalized approach to cancer treatment.
• Precision Medicine Advancement: Unlike conventional chemotherapy, mRNA vaccines are tailored to individual patients, enhancing effectiveness and reducing side effects.
• Potential for Multi-Cancer Application: Can be adapted to various cancer types by targeting multiple tumor antigens, making it a versatile treatment option.
• Improved Immune Response: Boosts the body’s natural defense mechanism, helping it recognize and destroy cancer cells more effectively.
• Question 4 of 5 4. Question Consider the following statements regarding Tamil Sangam literature: The Tolkappiyam is primarily a collection of Sangam-era heroic ballads. The Silappadikaram and Manimekalai were written in Sanskrit but translated into Tamil during the medieval period. The concept of “Aham” and “Puram” in Sangam poetry refers to temples and urban settlements. How many of the above statements is/are incorrect? (a) Only one (b) Only two (c) All three (d) None Correct Solution: C Statement 1 is incorrect: Tolkappiyam (c. 200 BCE) is an ancient Tamil grammatical work, not a collection of ballads. Statement 2 is incorrect: Silappadikaram and Manimekalai were composed in Tamil, not Sanskrit. Statement 3 is incorrect: “Aham” (love poetry) and “Puram” (warfare, heroism) refer to poetic themes, not temples or urban settlements. Incorrect Solution: C Statement 1 is incorrect: Tolkappiyam (c. 200 BCE) is an ancient Tamil grammatical work, not a collection of ballads. Statement 2 is incorrect: Silappadikaram and Manimekalai were composed in Tamil, not Sanskrit. Statement 3 is incorrect: “Aham” (love poetry) and “Puram” (warfare, heroism) refer to poetic themes, not temples or urban settlements.
#### 4. Question
Consider the following statements regarding Tamil Sangam literature:
• The Tolkappiyam is primarily a collection of Sangam-era heroic ballads.
• The Silappadikaram and Manimekalai were written in Sanskrit but translated into Tamil during the medieval period.
• The concept of “Aham” and “Puram” in Sangam poetry refers to temples and urban settlements.
How many of the above statements is/are incorrect?
• (a) Only one
• (b) Only two
• (c) All three
Solution: C
• Statement 1 is incorrect: Tolkappiyam (c. 200 BCE) is an ancient Tamil grammatical work, not a collection of ballads.
• Statement 2 is incorrect: Silappadikaram and Manimekalai were composed in Tamil, not Sanskrit.
• Statement 3 is incorrect: “Aham” (love poetry) and “Puram” (warfare, heroism) refer to poetic themes, not temples or urban settlements.
Solution: C
• Statement 1 is incorrect: Tolkappiyam (c. 200 BCE) is an ancient Tamil grammatical work, not a collection of ballads.
• Statement 2 is incorrect: Silappadikaram and Manimekalai were composed in Tamil, not Sanskrit.
• Statement 3 is incorrect: “Aham” (love poetry) and “Puram” (warfare, heroism) refer to poetic themes, not temples or urban settlements.
• Question 5 of 5 5. Question Which of the following best describes a Distributed Denial of Service (DDoS) attack? a) A type of malware that encrypts a victim’s data and demands ransom for decryption b) An attack where a hacker gains remote access to a system and steals sensitive data c) A coordinated effort where multiple devices flood a target system with excessive requests to disrupt its services d) A cyber attack that exploits zero-day vulnerabilities in operating systems Correct Solution: C Option (c) is correct: A DDoS attack overwhelms a target server, website, or network with high traffic from multiple compromised devices (botnets), causing service disruptions. Option (a) is incorrect: Encrypting files for ransom is associated with Ransomware attacks, not DDoS. Option (b) is incorrect: Remote access hacking is a different type of cyber attack (e.g., Remote Access Trojans). Option (d) is incorrect: Exploiting zero-day vulnerabilities is more associated with Advanced Persistent Threats (APT) than DDoS. What is a DDoS Attack? A Distributed Denial of Service (DDoS) attackfloods a server or network with excessive traffic, causing service disruptions. It leverages a botneta network of compromised devices—to send overwhelming requests to the target system. How Does a DDoS Attack Work? Botnet Formation:Hackers infect multiple devices with malware, converting them into bots. Traffic Overload:The botnet directs massive fake requests to the target, exhausting bandwidth or processing power. Service Disruption:Legitimate users experience slowdowns or complete service failure. Diversion Tactic:Attackers may use DDoS as a smokescreen for data breaches or malware deployment. How to Counter a DDoS Attack? Traffic Filtering:Identify and block malicious requests using AI-based monitoring. Rate Limiting:Restrict the number of requests per user to prevent overload. Bot Detection Tools:Use CAPTCHA and behavioral analysis to block automated attacks. Robust Authentication:Strengthen login security to prevent unauthorized access. Incident Response Teams:Establish cybersecurity teams to monitor, detect, and mitigate threats. Incorrect Solution: C Option (c) is correct: A DDoS attack overwhelms a target server, website, or network with high traffic from multiple compromised devices (botnets), causing service disruptions. Option (a) is incorrect: Encrypting files for ransom is associated with Ransomware attacks, not DDoS. Option (b) is incorrect: Remote access hacking is a different type of cyber attack (e.g., Remote Access Trojans). Option (d) is incorrect: Exploiting zero-day vulnerabilities is more associated with Advanced Persistent Threats (APT) than DDoS. What is a DDoS Attack? A Distributed Denial of Service (DDoS) attackfloods a server or network with excessive traffic, causing service disruptions. It leverages a botneta network of compromised devices—to send overwhelming requests to the target system. How Does a DDoS Attack Work? Botnet Formation:Hackers infect multiple devices with malware, converting them into bots. Traffic Overload:The botnet directs massive fake requests to the target, exhausting bandwidth or processing power. Service Disruption:Legitimate users experience slowdowns or complete service failure. Diversion Tactic:Attackers may use DDoS as a smokescreen for data breaches or malware deployment. How to Counter a DDoS Attack? Traffic Filtering:Identify and block malicious requests using AI-based monitoring. Rate Limiting:Restrict the number of requests per user to prevent overload. Bot Detection Tools:Use CAPTCHA and behavioral analysis to block automated attacks. Robust Authentication:Strengthen login security to prevent unauthorized access. Incident Response Teams:Establish cybersecurity teams to monitor, detect, and mitigate threats.
#### 5. Question
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
• a) A type of malware that encrypts a victim’s data and demands ransom for decryption
• b) An attack where a hacker gains remote access to a system and steals sensitive data
• c) A coordinated effort where multiple devices flood a target system with excessive requests to disrupt its services
• d) A cyber attack that exploits zero-day vulnerabilities in operating systems
Solution: C
Option (c) is correct: A DDoS attack overwhelms a target server, website, or network with high traffic from multiple compromised devices (botnets), causing service disruptions.
Option (a) is incorrect: Encrypting files for ransom is associated with Ransomware attacks, not DDoS.
Option (b) is incorrect: Remote access hacking is a different type of cyber attack (e.g., Remote Access Trojans).
Option (d) is incorrect: Exploiting zero-day vulnerabilities is more associated with Advanced Persistent Threats (APT) than DDoS.
• What is a DDoS Attack? A Distributed Denial of Service (DDoS) attackfloods a server or network with excessive traffic, causing service disruptions. It leverages a botneta network of compromised devices—to send overwhelming requests to the target system.
• A Distributed Denial of Service (DDoS) attackfloods a server or network with excessive traffic, causing service disruptions.
• It leverages a botneta network of compromised devices—to send overwhelming requests to the target system.
• How Does a DDoS Attack Work? Botnet Formation:Hackers infect multiple devices with malware, converting them into bots. Traffic Overload:The botnet directs massive fake requests to the target, exhausting bandwidth or processing power. Service Disruption:Legitimate users experience slowdowns or complete service failure. Diversion Tactic:Attackers may use DDoS as a smokescreen for data breaches or malware deployment.
• Botnet Formation:Hackers infect multiple devices with malware, converting them into bots.
• Traffic Overload:The botnet directs massive fake requests to the target, exhausting bandwidth or processing power.
• Service Disruption:Legitimate users experience slowdowns or complete service failure.
• Diversion Tactic:Attackers may use DDoS as a smokescreen for data breaches or malware deployment.
• How to Counter a DDoS Attack? Traffic Filtering:Identify and block malicious requests using AI-based monitoring. Rate Limiting:Restrict the number of requests per user to prevent overload. Bot Detection Tools:Use CAPTCHA and behavioral analysis to block automated attacks. Robust Authentication:Strengthen login security to prevent unauthorized access. Incident Response Teams:Establish cybersecurity teams to monitor, detect, and mitigate threats.
• Traffic Filtering:Identify and block malicious requests using AI-based monitoring.
• Rate Limiting:Restrict the number of requests per user to prevent overload.
• Bot Detection Tools:Use CAPTCHA and behavioral analysis to block automated attacks.
• Robust Authentication:Strengthen login security to prevent unauthorized access.
• Incident Response Teams:Establish cybersecurity teams to monitor, detect, and mitigate threats.
Solution: C
Option (c) is correct: A DDoS attack overwhelms a target server, website, or network with high traffic from multiple compromised devices (botnets), causing service disruptions.
Option (a) is incorrect: Encrypting files for ransom is associated with Ransomware attacks, not DDoS.
Option (b) is incorrect: Remote access hacking is a different type of cyber attack (e.g., Remote Access Trojans).
Option (d) is incorrect: Exploiting zero-day vulnerabilities is more associated with Advanced Persistent Threats (APT) than DDoS.
• What is a DDoS Attack? A Distributed Denial of Service (DDoS) attackfloods a server or network with excessive traffic, causing service disruptions. It leverages a botneta network of compromised devices—to send overwhelming requests to the target system.
• A Distributed Denial of Service (DDoS) attackfloods a server or network with excessive traffic, causing service disruptions.
• It leverages a botneta network of compromised devices—to send overwhelming requests to the target system.
• How Does a DDoS Attack Work? Botnet Formation:Hackers infect multiple devices with malware, converting them into bots. Traffic Overload:The botnet directs massive fake requests to the target, exhausting bandwidth or processing power. Service Disruption:Legitimate users experience slowdowns or complete service failure. Diversion Tactic:Attackers may use DDoS as a smokescreen for data breaches or malware deployment.
• Botnet Formation:Hackers infect multiple devices with malware, converting them into bots.
• Traffic Overload:The botnet directs massive fake requests to the target, exhausting bandwidth or processing power.
• Service Disruption:Legitimate users experience slowdowns or complete service failure.
• Diversion Tactic:Attackers may use DDoS as a smokescreen for data breaches or malware deployment.
• How to Counter a DDoS Attack? Traffic Filtering:Identify and block malicious requests using AI-based monitoring. Rate Limiting:Restrict the number of requests per user to prevent overload. Bot Detection Tools:Use CAPTCHA and behavioral analysis to block automated attacks. Robust Authentication:Strengthen login security to prevent unauthorized access. Incident Response Teams:Establish cybersecurity teams to monitor, detect, and mitigate threats.
• Traffic Filtering:Identify and block malicious requests using AI-based monitoring.
• Rate Limiting:Restrict the number of requests per user to prevent overload.
• Bot Detection Tools:Use CAPTCHA and behavioral analysis to block automated attacks.
• Robust Authentication:Strengthen login security to prevent unauthorized access.
• Incident Response Teams:Establish cybersecurity teams to monitor, detect, and mitigate threats.
Join our Official Telegram Channel HERE for Motivation and Fast Updates
Join our Twitter Channel HERE
Follow our Instagram Channel HERE