CN-120 Linux Fundamentals Week 4
Across
- 2. Unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top–level domain
- 4. Access control model where resources are protected by inflexible, system–defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label)
- 6. Media type that uses copper conductors a
- 9. Protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information
- 12. The default context–based permissions scheme provided with CentOS and Red Hat Enterprise Linux (RHEL)
- 13. Authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA
- 15. Single sign–on authentication and authorization service that is based on a time–sensitive, ticket–granting system
- 18. Widely used protocol analyzer
- 19. Authentication technology that enables a user to authenticate once and receive authorizations for multiple services
- 20. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication (MFA)
- 21. A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys
- 22. One link in the path from a host to a router or from router to router
- 24. Network protocol suite used to implement the internet and most WANs (wide–area networks) and LANs (local–area networks)
- 25. Protocol used to automatically assign IP addressing information to hosts that have not been configured manually
Down
- 1. A simplified interface for configuring the iptables firewall service
- 3. Routing mechanism that conceals internal addressing schemes from the public internet by translating between a single public address on the external side of a router and private, non–routable addresses internally
- 5. Broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment
- 7. Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities
- 8. Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types
- 10. A context–based permissions scheme provided with Debian–based and SUSE Linux distributions
- 11. Original, obsolete version of the security protocol now developed as transport layer security (TLS)
- 14. Encryption of all data on a disk can be accomplished via a supported OS, via third–party software, or at the controller level by the disk device itself
- 16. Intermediate system used to establish contention–free network segments at OSI layer 2 (Data Link).
- 17. Process of making a host or app configuration secure by reducing its attack surface, running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits
- 19. A cryptographic hashing algorithm created to address possible weaknesses in MD5. The current version is SHA–2
- 23. A password that is generated for use in one specific session and becomes invalid after the session ends