Across
- 3. Windows Event ____ lets you monitor system events.
- 7. The ____ toner fault isolation tool has two parts: the toner & the probe
- 8. Security management subsystems work by partitioning resources into ____ & unauthorized areas
- 10. This network management's subsystems may provide the ability to initialize, reconfigure, operate & shut down managed devices
- 14. Per the NSA IATF there are ____ classes of attacks
- 15. In performance management, these are determined for each important variable so exceeding them indicates a network problem worthy of attention
- 17. Administrators determine this by gathering statistics over time. Also known as: normal network traffic/activity
- 18. Among other things, network management systems incorporating accounting management functions may: collect customer ____ statistics
- 19. There are 2 types of fault management: passive & ____
Down
- 1. Real time CPU, Disk, Network & Memory performance can be viewed in the ____ Monitor window
- 2. There are ____ steps in the troubleshooting model
- 4. This network management area ensures internetwork performance can be maintained at an acceptable level
- 5. ____ Manager provides information about programs running on your computer
- 6. The ____ event logs can only be accessed by administrators
- 9. The goal of this network management is to measure network utilization parameters so it can be regulated
- 11. Air Force security management is provided by the ____ systems suite of tools (acronym)
- 12. The first step in accounting management is to ____ usage of all important network resources
- 13. The ____ of configuration management is to monitor network and system configuration information so the affected hardware can be managed and tracked
- 16. There are 3 types of event log: Application, Security & ____
