Elixir
Cybersecurity
MS SQL
C#
Grunge
100

This function is commonly used to transform each element in a list and return a new list.

What is Enum.map?

100

This type of attack attempts to trick users into revealing sensitive information through deceptive emails or websites.

What is phishing?

100

This SQL statement is used to retrieve data from one or more database tables.

What is SELECT?

100

This keyword is used to define a method that can be awaited asynchronously.

What is async?

100

This Seattle-based band released the landmark 1991 album Nevermind.

Who is Nirvana?

200

This OTP behavior is typically used for maintaining state and handling synchronous or asynchronous messages in a single process.

What is a GenServer?

200

This principle states that users and systems should only have the minimum permissions necessary to perform their tasks.

What is the Principle of Least Privilege?

200

This index type stores the actual table data in sorted order based on the index key and allows only one per table.

What is a clustered index?

200

This collection type provides key-value storage with thread-safe operations for concurrent access.

What is ConcurrentDictionary?

200

This Pearl Jam debut album featured tracks like “Alive,” “Jeremy,” and “Even Flow.”

What is Ten?

300

This operator pipes the result of one expression into the first argument of the next function call.

What is the pipe operator (|>)?

300

This type of vulnerability allows attackers to inject malicious commands or queries into an application through unsanitized input.

What is injection (such as SQL injection)?

300

This SQL Server feature automatically tracks historical changes to rows using system-versioned tables.

What are Temporal Tables?

300

This C# feature allows methods with the same name to exist with different parameter signatures.

What is method overloading?

300

This Soundgarden song includes the lyric, “I’m looking California and feeling Minnesota.”

What is Outshined?

400

This data structure stores key-value pairs and allows pattern matching against specific keys.

What is a Map?

400

This security model assumes that no user, device, or network should be automatically trusted, even inside the corporate perimeter.

What is Zero Trust?

400

This isolation mechanism uses row versioning to reduce blocking between readers and writers, increasing tempdb usage.

What is Read Committed Snapshot Isolation (RCSI)?

400

This garbage collection generation is intended for short-lived objects and is collected most frequently.

What is Generation 0 (Gen 0)?

400

This grunge supergroup featured members of Soundgarden and Pearl Jam and released the song “Hunger Strike.”

Who is Temple of the Dog?

500

This BEAM feature allows lightweight processes to recover automatically through hierarchical fault-tolerance strategies defined in OTP.

What are Supervisors (or the Supervisor tree model)?

500

This attack technique involves encrypting an organization’s data and demanding payment in exchange for the decryption key.

What is ransomware?

500

This common performance issue occurs when SQL Server caches an execution plan optimized for one parameter value that performs poorly for others.

What is parameter sniffing?

500

This keyword prevents inheritance of a class or overriding of a method.

What is sealed?

500

This Alice in Chains guitarist and songwriter co-founded the band and wrote many of its darkest, harmony-driven songs.

Who is Jerry Cantrell?

M
e
n
u