DNS
Cloud
Linux
Encryption
Subnet Calculations
100

DNS Services are often associated with this well known port number.

What is Port 53?

100

This cloud delivery model involves a provider hosting and manging a software for end user consumption

What is SAAS?

(Software as a Service)

100

This command can be used on Linux systems to find their IP address

What is 'ip addr'?

(ifconfig allowed)

100

This type of encryption is used to secure data that is stored, but not in use.

What is DAR?

(Data at Rest)

100

The subnet mask for this CIDR notation is 255.255.255.0

What is /24?

200

This secure implementation of DNS authenticates responses to domain name lookups.

What is DNSSEC?

200

This Amazon service allows users to rent virtual computers to run applications.

What is EC2?

200

This Linux command allows you to forcefully and recursively remove files and directories

What is 'rm -rf'?
200

This symmetric encryption standard is available in key sizes of 128, 192, and 256 bits, andis one of the most widely used and trusted types of encryption.

What is AES?

(Advanced Encryption Standard) 

200

The CIDR notation for this subnet mask is /28

What is 255.255.255.240

300

This type of DNS lookup requires a DNS server to communicate with several other DNS servers to locate an IP address to return it to the client.

What is Recursive DNS?

300

Customers may use solutions like Terraform to deploy environments within the cloud using this model

What is IAAC?

(Infrastructure as a Code)

300

This powerful text editor in Linux is well known for its steep learning curve and avid community.

What is VIM?

300

This type of encryption does not use the same key to encrypt/decrypt data.

What is asymmetric encryption?

300

This is the first address in a subnet.

What is a network ID?

400

This is the name record representing an IPv6 record

What is AAAA record?

400

This AWS service is a public cloud storage container.

What is an S3 bucket?

400

This time value is tracked as a single number to represent the time since midnight, January 1, 1970

What is Epoch Time?

400

This method of encrypting data involves operating on fixed length groups of bits.

What is a block/block cipher?

400

There are this many hosts in a network with a CIDR of /16

What are 16,777,214 hosts


(16 million is okay)

500

This type of DNS record maps an alias name to a canonical or "true" domain name.

What is a CNAME Record?

(Canonical name)

500

This AWS service allows customers to run code without provisioning or managing servers

What is Lambda?

500

The following command: :(){ :|:& };:

What is a fork bomb?

500

This facet of encryption involves processing the plaintext input through a series of substitutions, transpositions, and mixing

What is a round?

500

There are this many hosts in a network with a CIDR of /20

What are 4094 hosts?

M
e
n
u