Linux Crossword Puzzle
Across
- 1. log file that contains system info as well as login attempts
- 3. a form of security that uses a second private check to verify you (app, code, etc)
- 6. form of encryption that uses the same key
- 8. layer of security that scrutinizes network traffic
- 9. one half of an encryption method that uses two keys this key is only used by you
- 11. config file that allows you to set limits
- 13. one half of an encryption method that uses two keys this key is used by outside sources
- 15. form of authentication that uses biological forms of identification
- 19. the process of verifying identity
- 20. the highest level of privilege on linux
- 21. command to run privileged commands, requires a password.
Down
- 2. config file for sudo permissions
- 4. selection of people with the same permissions
- 5. hiding data in another media type
- 7. converting data into unreadable text using a key and an algorithm
- 10. file that stores password hashes and is restricted to root access.
- 12. malicious program designed to damage or steals data
- 14. denial of service attack that overwhelms a network with requests
- 16. command used to change permission of a file
- 17. command to safely edit the suodoers file
- 18. the command to change a password