set 1

123456789101112131415161718192021
Across
  1. 2. What do you call the authentication when it uses idea of Something You Know & Something You Have.
  2. 5. Email scam or attempt to trick you into giving your password or other personal information.
  3. 7. Never share your __________ with another person.
  4. 11. A directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.(2 words)
  5. 14. The Identifier that is used in CACIB to identify each one of us.
  6. 16. Do not send ______ information over email unless it is encrypted.
  7. 17. A Strong password should contain at least one of these.
  8. 18. Sensitive application of CACIB which helps other applications to do Strong authentication.
  9. 21. An Open standard used by GTIS for exchanging authentication and authorization information between 2 parties.
Down
  1. 1. A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted usually they say in Cloud.
  2. 3. 3-factor Authentication uses ________ like Finger-print scanning & retina scanning.
  3. 4. If I want an access to an application, I must create a request in_______________.
  4. 6. What feature helps you to assure the Non-repudiation.
  5. 8. What gets created when user’s request for application access is validated by all actors.
  6. 9. The Letter ‘I’ in GTIS stands for.
  7. 10. Applied to data to protect it from unauthorized use in case of theft or loss.
  8. 12. Considered one of the strongest 2-factor authentication and comes in the form of the USB-based Smart Tokens, Smart Cards, PFX files.
  9. 13. Applications need to be declared in __________ before they can be seen in GRANT.
  10. 15. Apart from Production & integration, Grant provides you an environment for development purpose.
  11. 19. SSO stands for _________ Sign On.
  12. 20. The letter ‘R’ in the GRANT stands for ______.