4240 Crossword

123456789101112131415161718192021
Across
  1. 1. The system call used to overwrite a process’s memory with a new executable file.
  2. 6. A modern "better" filesystem for Linux designed to handle large storage and prevent corruption.
  3. 8. A system utility that displays user login/idle time; often disabled as a security risk.
  4. 11. The standard tool used for packet filtering and firewall management on Linux.
  5. 12. Command used to display all UNIX group memberships for a user.
  6. 15. The value subtracted from 666 or 777 to determine default permissions for new files.
  7. 16. The security triad representing Confidentiality, Integrity, and Accessibility.
  8. 17. One of the main advantages of sudo is that everything is recorded here for audits.
  9. 18. The filename /etc/_______ which stores encrypted passwords and is NOT world-readable.
  10. 19. The standard remote login protocol (Port 22) that secures traffic over insecure networks.
  11. 21. The unique number (Process Identifier) assigned to every running process; init is always 1.
Down
  1. 2. Command used to change file ownership; once changed, a regular user cannot "take it back."
  2. 3. The only way to create a new process in Linux; it creates a child copy of the parent.
  3. 4. The 512-byte sector at the beginning of a disk that contains the partition table and boot code.
  4. 5. The superuser with a UID of 0 and unlimited privileges on the system.
  5. 7. The bit (Octal 1000) that prevents users from deleting files they didn't create in a shared directory.
  6. 9. The boot loader that should be password-protected to prevent unauthorized kernel edits.
  7. 10. Octal 4000; allows a file to execute with the permissions of the owner (often root).
  8. 13. Command used to perform specific chores without unlimited root privileges; everything is logged.
  9. 14. The filename /etc/_______ which contains the list of all users recognized by the system.
  10. 18. Short for the modern initialization system (systemd) that starts as PID 1.
  11. 20. Often referred to in class as the "weakest link" in the security chain (Social Engineering).