This type of cyber attack involves tricking individuals into revealing sensitive info by pretending to be a trustworthy entity, and is commonly carried out via email
What is phishing?
A virtual network that closely resembles a traditional private network that you'd operate in your own data center
What is a VPC?
A tool commonly used for version control in software development and facilitates collaboration among team members
What is git?
The term for a unique identifier assigned to each row in a database table
The practice of using virtualization techniques to create and manage reproducible software environments
What is containerization?
A term used to describe a flaw in an OS or app unknown by the vendor, for which there is no defense or patch
What is a zero-day vulnerability
A shared filesystem that can be mounted by multiple instances across multiple AZs
What is Amazon Elastic File System?
In OO Programming, this term defines creating a new class by sharing properties and behaviors from an existing class.
What is inheritance?
This type of database is known for its ability to handle a variety of non-relational data models, including key-value, document, columnar and graph formats
What is a NoSQL database?
This software development methodology emphasizes adaptive planning, evolutionary development, and continuous improvement
What is Agile?
An open-source tool used for network packet inspection and analysis
What is Wireshark?
This type of network adapter should be used for High Performance Computing (HPC) use cases that include tightly coupled applications
What is Amazon Elastic Fabric Adapter?
A program that translates from source code to machine code one statement at a time, and is used with languages such as Python and PHP
What is an interpreter?
The process of organizing data into "normal forms" to reduce data redundancy and improve data integrity
What is data normalization?
A popular open-source tool used for automating the deployment, scaling, and orchestration of containerized applications
What is Kubernetes?
The practice of hiding sensitive information within seemingly innocuous files or data
What is steganography?
This DynamoDB feature integrates with AWS Lambda to automatically execute functions in response to table updates
What is a DynamoDB Stream?
In Java, this occurs when two or more methods are created with the same name but differing parameters
What is Method Overloading?
The process of optimizing a database's structure, indexes, and queries to improve query performance and reduce resource consumption
What is database optimization or database tuning?
This hacker is known for participating in the hacker collectives LulzSec and Anonymous, and infamous for turning informant for the FBI.
Who is Hector Monsegur aka Sabu?
After performing Lexical Analysis in Phase 1 to tokenize the source code, compilers construct this model during Phase 2 Syntax Analysis.
What is an Abstract Syntax Tree?