chandigarh branch
delhi branch

11th April 2025

Raj malhotra

11th April 2025

1 / 5

Consider the following statements about insolvency proceedings under the Protection of Interests in Aircraft Objects Bill, 2025:

  1. The Bill mandates a 60-day "waiting period" for creditors to repossess aircraft after default, irrespective of ongoing insolvency proceedings.
  2. Article XI of the Cape Town Protocol takes precedence over the Insolvency and Bankruptcy Code, 2016, in cases involving aircraft objects.
  3. The DGCA must approve all remedies initiated by creditors during corporate insolvency resolution processes.

Which of the above statements is/are correct?

2 / 5

With reference to POEM-4, consider the following:

  1. It was launched aboard GSLV Mk-III to a 475 km sun-synchronous orbit.
  2. The platform tested a robotic arm capable of autonomous debris capture.
  3. Passivation involved venting residual fuel to prevent orbital collisions.
  4. It carried payloads exclusively developed by ISRO’s Vikram Sarabhai Space Centre.

Which statements are incorrect?

3 / 5

Which of the following is/are features of topological materials?

  1. Their surface electrons exhibit spin-orbit coupling, enabling metallic conductivity.
  2. They were first theorized by Nobel laureates in Chemistry in 2016.
  3. The 2025 International Year of Quantum Science marks their discovery centenary.
  4. Their insulating bulk property arises from covalent bonding.

Options:

4 / 5

Regarding Mount Kanlaon’s 2024–2025 eruptions, which statements are correct?

  1. The December 2024 eruption produced pyroclastic flows reaching 13 km from the summit.
  2. PHIVOLCS attributed heightened activity in April 2025 to magma mixing with groundwater.
  3. Wildfires triggered by volcanic debris were contained by monsoon rains.
  4. The volcano’s stratovolcanic structure contributes to its high explosivity.

Options:

5 / 5

Which of the following are implications of the Digital Threat Report 2024 for India’s BFSI sector?

  1. AI-driven phishing campaigns now exploit biometric authentication loopholes.
  2. Over 60% of cyberattacks originate from compromised third-party vendors.
  3. Regulatory harmonization is shifting compliance from a tactical to strategic function.
  4. Legacy systems using COBOL are primary targets due to unpatched vulnerabilities.

Select the correct answer using the codes below:

Your score is

The average score is 0%

0%

Share:

More Quizzes

Send Us A Message

Contact Us