Cyber
AWS
Software Fundamentals
Database Systems
DevOps
100

This type of cyber attack involves tricking individuals into revealing sensitive info by pretending to be a trustworthy entity, and is commonly carried out via email

What is phishing?

100

A virtual network that closely resembles a traditional private network that you'd operate in your own data center

What is a VPC?

100

A tool commonly used for version control in software development and facilitates collaboration among team members

What is git?

100

The term for a unique identifier assigned to each row in a database table

What is a primary key?
100

The practice of using virtualization techniques to create and manage reproducible software environments

What is containerization?

200

A term used to describe a flaw in an OS or app unknown by the vendor, for which there is no defense or patch

What is a zero-day vulnerability

200

A shared filesystem that can be mounted by multiple instances across multiple AZs

What is Amazon Elastic File System?

200

In OO Programming, this term defines creating a new class by sharing properties and behaviors from an existing class.

What is inheritance?

200

This type of database is known for its ability to handle a variety of non-relational data models, including key-value, document, columnar and graph formats

What is a NoSQL database?

200

This software development methodology emphasizes adaptive planning, evolutionary development, and continuous improvement

What is Agile?

300

An open-source tool used for network packet inspection and analysis

What is Wireshark?

300

This type of network adapter should be used for High Performance Computing (HPC) use cases that include tightly coupled applications

What is Amazon Elastic Fabric Adapter?

300

A program that translates from source code to machine code one statement at a time, and is used with languages such as Python and PHP

What is an interpreter?

300

The process of organizing data into "normal forms" to reduce data redundancy and improve data integrity

What is data normalization?

300

A popular open-source tool used for automating the deployment, scaling, and orchestration of containerized applications

What is Kubernetes?

400

The practice of hiding sensitive information within seemingly innocuous files or data

What is steganography?

400

This DynamoDB feature integrates with AWS Lambda to automatically execute functions in response to table updates

What is a DynamoDB Stream?

400

In Java, this occurs when two or more methods are created with the same name but differing parameters

What is Method Overloading?

400

The process of optimizing a database's structure, indexes, and queries to improve query performance and reduce resource consumption

What is database optimization or database tuning?

500

This hacker is known for participating in the hacker collectives LulzSec and Anonymous, and infamous for turning informant for the FBI.

Who is Hector Monsegur aka Sabu?

500

After performing Lexical Analysis in Phase 1 to tokenize the source code, compilers construct this model during Phase 2 Syntax Analysis.

What is an Abstract Syntax Tree?

M
e
n
u