Cybersecurity Practices
Infrastructure as Code
DNS & Domains
Career & Certification
Red Flags in the Field
100

The process of verifying identity.

What is authentication?

100

Configuration management tool that uses YAML playbooks.

What is Ansible?

100

Converts domain names to IP addresses.

What is DNS?

100

Entry-level certification for IT support.

What is CompTIA A+?

100

Running as root/admin without reason.

What is a security risk?

200

Something you know, something you have, and something you are describe this.

What is multi-factor authentication (MFA)?

200

Terraform file extension.

What is .tf?

200

This DNS record type maps domain names to IPs.

What is an A record?

200

A Microsoft certification focused on cloud administration.

What is Azure Administrator Associate?

200

Not documenting changes to a production system.

What is bad change management?

300

Security concept that assumes breaches will happen.

What is zero trust?

300

Git best practice for making changes safely.

What is creating a branch and pull request?

300

Record type for mail servers.

What is an MX record?

300

This resume section shows your job experience.

What is Work History or Experience?

300

Not testing backups.

What is a disaster waiting to happen?

400

Tool that scans for vulnerabilities.

What is Nessus or OpenVAS?

400

This file defines steps for automated CI/CD.

What is a pipeline (e.g., .github/workflows, Jenkinsfile)?

400

This DNS server is responsible for a specific domain zone.

What is an authoritative nameserver?

400

Good answer to "Tell me about a time you solved a technical problem."

What is the STAR method (Situation, Task, Action, Result)?

400

Ignoring failed logins in system logs.

What is missing a possible breach?

500

Term for a server hardened to act as a secure gateway.

What is a bastion host?

500

A declarative configuration file defines infrastructure in this way.

What is "desired state"?

500

This attack spoofs DNS responses.

What is DNS poisoning or spoofing?

500

One key soft skill for system admins.

What is communication?

500

Giving users more access than necessary.

What is violating least privilege?