CN-120 Linux Fundamentals Week 4

12345678910111213141516171819202122232425
Across
  1. 2. Unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top–level domain
  2. 4. Access control model where resources are protected by inflexible, system–defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label)
  3. 6. Media type that uses copper conductors a
  4. 9. Protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information
  5. 12. The default context–based permissions scheme provided with CentOS and Red Hat Enterprise Linux (RHEL)
  6. 13. Authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA
  7. 15. Single sign–on authentication and authorization service that is based on a time–sensitive, ticket–granting system
  8. 18. Widely used protocol analyzer
  9. 19. Authentication technology that enables a user to authenticate once and receive authorizations for multiple services
  10. 20. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication (MFA)
  11. 21. A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys
  12. 22. One link in the path from a host to a router or from router to router
  13. 24. Network protocol suite used to implement the internet and most WANs (wide–area networks) and LANs (local–area networks)
  14. 25. Protocol used to automatically assign IP addressing information to hosts that have not been configured manually
Down
  1. 1. A simplified interface for configuring the iptables firewall service
  2. 3. Routing mechanism that conceals internal addressing schemes from the public internet by translating between a single public address on the external side of a router and private, non–routable addresses internally
  3. 5. Broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment
  4. 7. Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities
  5. 8. Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types
  6. 10. A context–based permissions scheme provided with Debian–based and SUSE Linux distributions
  7. 11. Original, obsolete version of the security protocol now developed as transport layer security (TLS)
  8. 14. Encryption of all data on a disk can be accomplished via a supported OS, via third–party software, or at the controller level by the disk device itself
  9. 16. Intermediate system used to establish contention–free network segments at OSI layer 2 (Data Link).
  10. 17. Process of making a host or app configuration secure by reducing its attack surface, running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits
  11. 19. A cryptographic hashing algorithm created to address possible weaknesses in MD5. The current version is SHA–2
  12. 23. A password that is generated for use in one specific session and becomes invalid after the session ends