In TCS security protocols, what does the principle of 'Zero Trust' architecture entail?
ATrusting all internal network traffic without verification
BVerifying every user and device regardless of network location before granting access
CEliminating all security measures for improved user experience
DUsing only perimeter-based security controls
Correct Answer:
B. Verifying every user and device regardless of network location before granting access
EXPLANATION
Zero Trust architecture assumes no implicit trust. Every access request—internal or external—must be authenticated, authorized, and encrypted. It's modern security framework addressing remote work challenges.
A TCS project requires processing 10 million records daily with complex business logic. The team needs to choose between batch processing and stream processing. Which statement is TRUE?
AStream processing is always superior for all scenarios
BBatch processing provides lower latency than stream processing
Correct Answer:
C. Stream processing offers lower latency but higher complexity; batch processing suits scheduled tasks
EXPLANATION
Stream processing processes data in real-time with lower latency but higher architectural complexity. Batch processing is cost-effective for scheduled, non-urgent tasks. Choice depends on requirements.
A TCS team is developing a microservices architecture where each service maintains its own database. Which of the following is the PRIMARY challenge they will face?
AData consistency across distributed services
BIncreased CPU utilization
CReduced network bandwidth
DSimplified authentication mechanisms
Correct Answer:
A. Data consistency across distributed services
EXPLANATION
In microservices architecture, maintaining data consistency across independently managed databases (polyglot persistence) is a significant challenge. ACID transactions cannot span multiple databases, requiring eventual consistency patterns.
TCS cybersecurity team emphasizes password security. Which is the STRONGEST password practice?
AUsing dictionary words with birth year
B12-character minimum with mix of uppercase, lowercase, numbers, and special characters
CSame password across multiple systems
DWriting passwords in documentation
Correct Answer:
B. 12-character minimum with mix of uppercase, lowercase, numbers, and special characters
EXPLANATION
Strong passwords require length (12+ characters), character variety, and complexity. Reusing passwords and storing them insecurely significantly increases security risks.
In TCS technical assessments, a question asks about polymorphism. Which is NOT a type of polymorphism in OOP?
ACompile-time (Method Overloading)
BRuntime (Method Overriding)
CStatic Polymorphism
DSequential Polymorphism
Correct Answer:
D. Sequential Polymorphism
EXPLANATION
The two main types of polymorphism are compile-time (static overloading) and runtime (dynamic overriding). Sequential polymorphism is not a recognized OOP concept.