Block 3, Unit 1

12345678910111213141516171819
Across
  1. 3. Windows Event ____ lets you monitor system events.
  2. 7. The ____ toner fault isolation tool has two parts: the toner & the probe
  3. 8. Security management subsystems work by partitioning resources into ____ & unauthorized areas
  4. 10. This network management's subsystems may provide the ability to initialize, reconfigure, operate & shut down managed devices
  5. 14. Per the NSA IATF there are ____ classes of attacks
  6. 15. In performance management, these are determined for each important variable so exceeding them indicates a network problem worthy of attention
  7. 17. Administrators determine this by gathering statistics over time. Also known as: normal network traffic/activity
  8. 18. Among other things, network management systems incorporating accounting management functions may: collect customer ____ statistics
  9. 19. There are 2 types of fault management: passive & ____
Down
  1. 1. Real time CPU, Disk, Network & Memory performance can be viewed in the ____ Monitor window
  2. 2. There are ____ steps in the troubleshooting model
  3. 4. This network management area ensures internetwork performance can be maintained at an acceptable level
  4. 5. ____ Manager provides information about programs running on your computer
  5. 6. The ____ event logs can only be accessed by administrators
  6. 9. The goal of this network management is to measure network utilization parameters so it can be regulated
  7. 11. Air Force security management is provided by the ____ systems suite of tools (acronym)
  8. 12. The first step in accounting management is to ____ usage of all important network resources
  9. 13. The ____ of configuration management is to monitor network and system configuration information so the affected hardware can be managed and tracked
  10. 16. There are 3 types of event log: Application, Security & ____