Unit 6 Security +
Across
- 2. uses labels for both subjects (users who need access) and objects (resources with controlled access, such as data, applications, systems, networks, and physical space)
- 4. a list that identifies users or groups who have specific security assignments to an object.
- 7. process of copying changes to Active Directory on the domain controllers.
- 8. the verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.
- 10. type of access that is allowed or denied for an object.
- 11. a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.
- 12. group of related domains that share the same contiguous DNS namespace.
- 14. Account policies help you control the composition and use of passwords.
- 15. set of configuration settings applied to users or computers.
- 16. can be your role, position, or current project. This information can be used to determine policy and permission.
Down
- 1. The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
- 3. collection of related domain trees.
- 5. have limited permission
- 6. The point at which the number of false positives matches the number of false negatives in a biometric system.
- 8. developed by Microsoft, is a centralized database that contains user accounts and security information.
- 9. have complete control of the system
- 13. device or a file used to authenticate