22.04.2025 1 / 5 Q1. With reference to the Narcotic Drugs and Psychotropic Substances (NDPS) Act, 1985, consider the following statements: The Act divides punishment for offenses based on the quantity of drugs, categorizing them as small quantity, commercial quantity, and intermediate quantity. Under the Act, capital punishment can be awarded for certain repeat offenses. The Central Government has the exclusive power to add or remove any substance from the schedule of controlled substances. Which of the statements given above is/are correct? a) 1 and 2 only b) 2 only c) 1 and 3 only d) 1, 2 and 3 2 / 5 Q2. Consider the following pairs of active volcanoes and their locations: Mount Etna : Italy Mount Fuji : Japan Mount Kilimanjaro : Kenya Which of the pairs given above is/are correctly matched? a) 1 only b) 1 and 2 only c) 2 and 3 only d) 1, 2 and 3 3 / 5 Q3. Sittwe, Kyaukphyu, and Dawei, recently seen in news, are: a) Major deep-sea ports in Myanmar b) Ancient Buddhist heritage sites damaged during recent military conflicts in Myanmar c) New trade corridors established under the BIMSTEC connectivity initiative d) Marine protected areas in the Bay of Bengal affected by coral bleaching 4 / 5 Q4. With reference to the Maratha military landscapes and fortification systems, consider the following statements: The term 'Gadkot' refers to the hillfort architecture developed under Maratha rule, while 'Qilakot' represents the plains fortifications. The Western Ghats fortification system built by Marathas consists of sea forts, hill forts, and land forts called 'Janjira', 'Gad', and 'Kota' respectively. Raigad served as Chhatrapati Shivaji's capital and exemplifies the concept of 'Mavalas' - a military landscape integrating natural terrain with defensive architecture. Which of the statements given above is/are correct? a) 1 only b) 2 and 3 only c) 1 and 3 only d) 1, 2 and 3 5 / 5 Q5. Which of the following pairs of cyber attacks and their characteristics is/are incorrectly matched? Zero-day attack : Exploitation of a vulnerability before developers have an opportunity to create a patch Ransomware : A type of malicious software that holds data hostage until a ransom is paid Man-in-the-middle : A cyber attack where the perpetrator impersonates a trusted organization to steal sensitive information SQL injection : An attack that deliberately inserts malicious SQL code into database queries Select the correct answer using the code given below: a) 3 only b) 2 and 4 only c) 1 and 3 only d) 1, 2 and 4 only Your score isThe average score is 20% 0% Restart quiz