System Administration Crossword
Across
- 3. Files typically found in /var/log used for auditing and troubleshooting security events.
- 5. The user interface for access to an operating system's services; examples include bash, zsh, and sh.
- 6. The bootloader; securing this prevents unauthorized users from booting into single-user mode.
- 9. A background process that handles requests for services.
- 11. The command or function that determines the default permissions for newly created files.
- 13. The specific file in /etc/ that stores encrypted user passwords.
- 14. The unique name assigned to a device on a network.
- 16. A file that contains a list of commands to be run at specified times.
- 17. The standard for message logging that separates the generator from the storage.
- 19. Command used to change the owner and group of a file or directory.
- 20. A custom shortcut for a command.
- 22. Command used to execute programs with the security privileges of another user.
- 23. The unique numerical identifier assigned by Linux to each user on the system.
Down
- 1. Command-line utility for querying and displaying logs from systemd-journald.
- 2. The core of the OS.
- 4. The configuration file located at /etc/ that determines which users have super privileges.
- 7. A shell script run every time a new interactive shell starts.
- 8. System configuration file that contains information about all available disk partitions and mount points.
- 10. The file that contains basic user information, though not the actual passwords in modern systems.
- 12. The conventional name of the user who has all rights or permissions in all modes on Linux.
- 15. A cryptographic network protocol for operating network services securely over an unsecured network.
- 18. A collection of users; permissions can be assigned to this entity to manage access for multiple people.
- 19. The utility used to change file system access permissions.
- 21. A permission bit set on a directory that allows only the item's owner to delete or rename files.