Linux
Cloud Technology
Kubernetes
Cybersecurity
Software Engineering
100

What is Ubuntu?

A popular Linux distribution known for its ease of use and installation.

100

This company is the largest provider of cloud infrastructure services.

AWS

100

What is the shortened version/abbreviation of Kubernetes?

K8s 

100

What is ransomware?

A type of malware that encrypts the victim's files, demanding a ransom to restore access.

100

What is a boolean?

A basic concept in programming that represents true or false conditions.

200

What is the command "ls" for?

The command used to list files and directories in Linux.

200

What does GCP stand for?

Google Cloud Platform (GCP)

200
What is the command to show the logs of a pod in kubernetes?

kubectl get logs [pod-name] -n [namespace]

200
What industry is most targeted by ransomware attacks?

Healthcare Industry!

They are targeted because they cannot AFFORD to have any downtime. Lives are on the line :(

200

What is an array?

This data structure stores elements in a fixed-size sequential collection, and typically, all elements must be of the same data type.

300

What is the default text editor in many Linux distributions.

Vi/Vim

300

A cloud computing service model that offers development and deployment environments for application services.

Platform as a Service (PaaS)

300

What is a node in Kubernetes?

In Kubernetes, a node is a worker machine in the Kubernetes cluster. This machine can be either a physical computer in a datacenter or a virtual machine (VM) hosted on a cloud provider or on-premise.

This is where the app is actually running. 

300

What is whaling?

Whaling is a common cyber attack that occurs when an attacker utilizes spear phishing methods to go after a large, high-profile target, such as c-suite executives.

300

What is a list?

In programming, this data structure can dynamically resize, allowing it to grow or shrink as needed. It can often contain elements of different types.

400

Powerful tool used for searching text patterns within files in Linux.

grep

400

What is a hyervisor?

A hypervisor, also known as a virtual machine monitor or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines.

400

What is a kubernetes cluster?

A collection of nodes that is managed by a master node in Kubernetes.

400

What is a red hat hacker?

A hacker who acts as a digital activist or a vigilante and uses their hacking knowledge to convey a message. Their reasons for hacking might be political, social, religious, or ideological.

400

What's the most basic way to debug code/logic?

Print something after every function / line


500

The Linux command used to view the content of a file one page at a time.

less

500

How do you connect two private clouds/subnets in AWS?

Using a NAT Gateway :D 

A NAT gateway is a Network Address Translation (NAT) service. You can use a NAT gateway so that instances in a private subnet can connect to services outside your VPC but external services cannot initiate a connection with those instances.

500

What is a ReplicaSet?

In Kubernetes, this object is used to manage a set of replica pods.

ReplicaSets determine how many pods must stay alive

500

What is the NIST?

National Institute of Standards and Technology

This cybersecurity framework is popular for managing and mitigating cyber security risk based on existing standards, guidelines, and practices.

500

What is a Binary Search? >:)

this search algorithm finds the position of a target value within a sorted array by repeatedly dividing the search interval in half.

M
e
n
u