What is Ubuntu?
A popular Linux distribution known for its ease of use and installation.
This company is the largest provider of cloud infrastructure services.
AWS
What is the shortened version/abbreviation of Kubernetes?
K8s
What is ransomware?
A type of malware that encrypts the victim's files, demanding a ransom to restore access.
What is a boolean?
A basic concept in programming that represents true or false conditions.
What is the command "ls" for?
The command used to list files and directories in Linux.
What does GCP stand for?
Google Cloud Platform (GCP)
kubectl get logs [pod-name] -n [namespace]
Healthcare Industry!
They are targeted because they cannot AFFORD to have any downtime. Lives are on the line :(
What is an array?
This data structure stores elements in a fixed-size sequential collection, and typically, all elements must be of the same data type.
What is the default text editor in many Linux distributions.
Vi/Vim
A cloud computing service model that offers development and deployment environments for application services.
Platform as a Service (PaaS)
What is a node in Kubernetes?
In Kubernetes, a node is a worker machine in the Kubernetes cluster. This machine can be either a physical computer in a datacenter or a virtual machine (VM) hosted on a cloud provider or on-premise.
This is where the app is actually running.
What is whaling?
Whaling is a common cyber attack that occurs when an attacker utilizes spear phishing methods to go after a large, high-profile target, such as c-suite executives.
What is a list?
In programming, this data structure can dynamically resize, allowing it to grow or shrink as needed. It can often contain elements of different types.
Powerful tool used for searching text patterns within files in Linux.
grep
What is a hyervisor?
A hypervisor, also known as a virtual machine monitor or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines.
What is a kubernetes cluster?
A collection of nodes that is managed by a master node in Kubernetes.
What is a red hat hacker?
A hacker who acts as a digital activist or a vigilante and uses their hacking knowledge to convey a message. Their reasons for hacking might be political, social, religious, or ideological.
What's the most basic way to debug code/logic?
Print something after every function / line
The Linux command used to view the content of a file one page at a time.
less
How do you connect two private clouds/subnets in AWS?
Using a NAT Gateway :D
A NAT gateway is a Network Address Translation (NAT) service. You can use a NAT gateway so that instances in a private subnet can connect to services outside your VPC but external services cannot initiate a connection with those instances.
What is a ReplicaSet?
In Kubernetes, this object is used to manage a set of replica pods.
ReplicaSets determine how many pods must stay alive
What is the NIST?
National Institute of Standards and Technology
This cybersecurity framework is popular for managing and mitigating cyber security risk based on existing standards, guidelines, and practices.
What is a Binary Search? >:)
this search algorithm finds the position of a target value within a sorted array by repeatedly dividing the search interval in half.