Developing Network Security Strategies and Network Management Strategies

123456789
Across
  1. 3. A protocol that identify devices and monitor their performance
  2. 4. There is how many network management components?
  3. 7. Management process that keep track of the network used by department
  4. 8. Is asset important in network security?
  5. 9. Protocol used for remote authentication
Down
  1. 1. How many components of security policies exist ?
  2. 2. Encryption often used for vpn
  3. 4. Performance metric
  4. 5. Short form of remote monitoring
  5. 6. Enforces security policies at the boundary between networks