In the Clouds
DevOps
Fire Flame
Identity Crisis
Tip your Server
100

This cloud service model is the most basic of models that includes only hardware, facilities, abstraction, and APIs and put the least amount of responsibility on the cloud provider compared to the other models.

Infrastructure as a Service.

100

In DevOps terms, what does the acronym CI/CD stand for?

Continuous Integration and Continuous Delivery / Deployment

100

The firewall / security list rule type that determines what traffic can enter a system.

Ingress Rules

100

This acronym is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. 

Identity and Access Management

100
This Microsoft Windows service allows a user to access graphical desktops and Windows applications remotely.

Remote Desktop Service (RDS)

200

This is a web application utilized in AWS environments that comprises and refers to a broad collection of service consoles for managing AWS resources.

AWS Management Console

200

A __________ is where you store your code and make changes to it within the version control tool.

Repository

200

This type of security concept only allows traffic from destinations labeled as "good" senders

Whitelisting

200

In an IAM system, this principle is based around only providing users the bare minimum access that they require in order to perform their job responsibilities.

Principle of Least Privilege

200

This linux command lists all local users on a linux server.

/etc/passwd

300

While "firewalls" are utilized in a traditional environment, these are typically utilized in an AWS cloud environment to filter incoming and outgoing traffic from an EC2 instance.

Security Groups / Rules

300

This type of request allows a developer to check source code changes into a branch, allowing other DevOps personnel to review and approve the change prior to implementation.

Merge Request

300

This type of firewall has set rules that does not change based on the context of a packet

Static Packet Filtering

300

The process of a user gaining access to a resource or object based on the privileges associated with their credentials.

Authorization

300

This is a cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework that runs on Windows, Linux, and macOS.

PowerShell

400

A cloud service provider hosts cloud instances in separate geographic areas called regions. In each region, this is the term to describe the multiple, isolated locations a cloud service customer can host their services.

Availability Zones

400

This type of testing is utilized in CI/CD pipelines to check source code for known vulnerabilities prior to implementation.

Static Application Security Testing (SAST)

400

Organizations that want multiple devices to employ a single IP address prior to transferring information would utilize this firewall functionality.

Network Address Translation (NAT)

400

This is an authentication protocol that allows third-party websites to access and retrieve select pieces of information from larger websites in order to authenticate users. (Ex. Google, Facebook)

OAuth

400
This Linux command is utilized to show the the users and groups that have access to run commands that require root rights on the server.

/etc/sudoers

500

This is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.

Cloud Computing

500

In a typical DevOps version control tool, personnel would implement these in order to prevent unauthorized changes from being implemented into production

Branch Protection Rules / Settings

500

This firewall is configured to examine all HTTP traffic between external users and externally facing applications.

Web Application Firewall (WAF)

500

This IAM method allows for linking of a user's identity across multiple separate identity management systems (Okta, etc.)

Federated Identity

500

This Windows Group Policy Object (GPO) is the default GPO utilized to determine the Password Policy and Account Lockout Policy on a server that is tied to the Domain.

Default Domain Policy

M
e
n
u