Networking
Automation
Security
Backup and Recovery
Compliance
100

This service resolves a hostname to an IP address.

What is DNS?(Domain Name Service)

100

This scripting language is commonly used in Microsoft environments.

What is PowerShell?

100

This security principle says users should only have the minimum level of access needed to complete their jobs.

What is the Principle of Least Privilege?

100

This defines the maximum acceptable downtime for a service following an outage.

What is RTO? (Recovery Time Objective)

100

This security standard specifically addresses protection for cardholder data.

What is PCI DSS? (Payment Card Industry Data Security Standard) 

200

This tool restricts access to traffic at the instance level.

What is a security group?

200

This tool co-ordinates multiple automated workflows.

What is Orchestration?

200

This tool provides a secure, encrypted tunnel over the public internet.

What is a VPN? (Virtual Private Network)

200

This backup method uses a full previous backup as well as subsequent incremental backups.

What is a Synthetic Full Backup?

200

Healthcare data is protected under this regulation.

What is HIPAA? (Health Insurance Portability and Accountability Act)

300

This service allows an private network to access the internet.

What is NAT? (Network Address Translation)

300

Configuration drift can be reduced by this type of infrastructure.

What is an Immutable Infrastructure?

300

This protocol synchronizes time between devices.

What is NTP? (Network Time Protocol)

300

This option allows a private cloud to expand into the public cloud to maintain access to services when on-prem resources run out.

What is Cloud Bursting?

300

This principle of digital data defines which laws and governance data falls under due to the location it is stored in.

What is Data Sovereignty?

400

A logically isolated, private network hosted within a public cloud provider’s infrastructure

What is a VPC? (Virtual Private Cloud)

400

This automation is triggered by specific conditions occuring.

What is Event-driven automation?

400

This security model assumes every request might be a threat and forces continuous authentication.

What is Zero Trust?

400

This rule recommends having three backups, two different media types, and one backup stored offsite.

What is the '3-2-1 Rule'?

400

An organization is required to preserve data for legal proceedings.

What is a Litigation Hold?

500

This routing protocol dynamically updates paths.

What is BGP? (Border Gateway Protocol)

500

This automation triggers when certain performance metrics are exceeded.

What is Auto-scaling?

500

This tool is inline with network traffic and can block threats immediately.

What is an IPS? (Internal Prevention System)

500

This backup captures the operating systems registry, boot files, and Active Directory Database.

What is a System-State Backup?

500

Data classification that is intended for general use data that would not harm the business if released.

What is Public data?