Unit 6

1234567891011121314151617
Across
  1. 2. method confirming identity using two or more means of authentication.
  2. 7. data, applications, systems, networks, or physical space.
  3. 9. error occurring when a person is falsely denied access.
  4. 12. centralized database containing user accounts and security information.
  5. 13. collection of trees.
  6. 14. process of confirming the identity of a user.
  7. 16. collection of network resources that share common directory database and policies.
  8. 17. users, applications, or processes that need access to objects.
Down
  1. 1. controls the type of access that is allowed or denied.
  2. 3. process of validating identity.
  3. 4. Granting or denying access to resources or a computer.
  4. 5. error occurring when a person is falsely allowed access.
  5. 6. network resources stored as objects in Active Directory.
  6. 8. set of configuration settings applied to user or computers.
  7. 10. ability to permit or deny access to network resources.
  8. 11. similar appearance to credit cards, have an embedded memory chip used for authentication.
  9. 15. group of related domains