set 1
Across
- 2. What do you call the authentication when it uses idea of Something You Know & Something You Have.
- 5. Email scam or attempt to trick you into giving your password or other personal information.
- 7. Never share your __________ with another person.
- 11. A directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.(2 words)
- 14. The Identifier that is used in CACIB to identify each one of us.
- 16. Do not send ______ information over email unless it is encrypted.
- 17. A Strong password should contain at least one of these.
- 18. Sensitive application of CACIB which helps other applications to do Strong authentication.
- 21. An Open standard used by GTIS for exchanging authentication and authorization information between 2 parties.
Down
- 1. A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted usually they say in Cloud.
- 3. 3-factor Authentication uses ________ like Finger-print scanning & retina scanning.
- 4. If I want an access to an application, I must create a request in_______________.
- 6. What feature helps you to assure the Non-repudiation.
- 8. What gets created when user’s request for application access is validated by all actors.
- 9. The Letter ‘I’ in GTIS stands for.
- 10. Applied to data to protect it from unauthorized use in case of theft or loss.
- 12. Considered one of the strongest 2-factor authentication and comes in the form of the USB-based Smart Tokens, Smart Cards, PFX files.
- 13. Applications need to be declared in __________ before they can be seen in GRANT.
- 15. Apart from Production & integration, Grant provides you an environment for development purpose.
- 19. SSO stands for _________ Sign On.
- 20. The letter ‘R’ in the GRANT stands for ______.