Unit 6
Across
- 3. This information can be used to determine policy and permission.
- 10. the process of validating identity. It includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.
- 11. The number of subjects or authentication attempts that can be validated.
- 12. A list that identifies users or groups who have specific security assignments to an object.
- 13. restrictions on the use of a user account for login.
- 14. a centralized database developed by Microsoft that contains user accounts and security information.
- 15. an administratively-defined collection of network resources that share a common directory database and security policies.
- 16. This type of authentication requires capturing and storing a unique physical attribute with a biometric system.
- 17. granting or denying access to an object based on the level of permissions or the actions allowed with the object.
Down
- 1. Account policies that help you control the composition and use of passwords.
- 2. The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
- 4. the ability to permit or deny access to resources on a network or computer.
- 5. plastic cards similar to credit cards that have an embedded memory chip that contains encrypted authentication information.
- 6. maintaining a record of the activity within the information system.
- 7. A system access control list is used by Microsoft for auditing in order to identify past actions performed by users on an object.
- 8. states that users or groups are given only the access they need to do their jobs and nothing more.
- 9. a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.