Across
- 2. method confirming identity using two or more means of authentication.
- 7. data, applications, systems, networks, or physical space.
- 9. error occurring when a person is falsely denied access.
- 12. centralized database containing user accounts and security information.
- 13. collection of trees.
- 14. process of confirming the identity of a user.
- 16. collection of network resources that share common directory database and policies.
- 17. users, applications, or processes that need access to objects.
Down
- 1. controls the type of access that is allowed or denied.
- 3. process of validating identity.
- 4. Granting or denying access to resources or a computer.
- 5. error occurring when a person is falsely allowed access.
- 6. network resources stored as objects in Active Directory.
- 8. set of configuration settings applied to user or computers.
- 10. ability to permit or deny access to network resources.
- 11. similar appearance to credit cards, have an embedded memory chip used for authentication.
- 15. group of related domains
