Across
- 3. A protocol that identify devices and monitor their performance
- 4. There is how many network management components?
- 7. Management process that keep track of the network used by department
- 8. Is asset important in network security?
- 9. Protocol used for remote authentication
Down
- 1. How many components of security policies exist ?
- 2. Encryption often used for vpn
- 4. Performance metric
- 5. Short form of remote monitoring
- 6. Enforces security policies at the boundary between networks
