Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

M L V A R K R W O R M X H D L A U G N J
C A F T N E M E G A N A M Y C I L O P E
U U P H G N P L A T F O R M D O I A C D
S T R R C C E E L O N N I S V T S N S A
R H P E C R P S G I V N T U C S A R B O
E E X E Q Y T C T I O A L E I U E C L L
T N N T B P I O R N E N T V N V E J A K
L T O I C T R U V R E E E I R U H Q U R
I I E E J I S Y H R D T T E V B S C T O
F C X R N O S T A N H N S L N L R I H W
T A J G I N E B O R O Y L C E E R M O O
E T Z U N V I I E C X A L V G E A O R R
K I G X I L S A S O W F E A I N G N I K
C O V T I U T S R E Z L R T A G D O Z S
A N C T R S E P R C D O O G B R X G A T
P A Y T E N F I V I T W E E U T P R T A
D L N R I N F R A S T R U C T U R E I T
P I V S E C U R I T Y P O L I C Y J O I
E E U T I L I Z A T I O N Z M H O U N O
R B A C K U P P R O G R A M S U H M R N
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # # # # W O R M # # # # # # # N #
2# A # T N E M E G A N A M Y C I L O P E
3# U # H # N P L A T F O R M # # I A C D
4S T # R # C # # # # N # # S V T S N S A
5R H # E # R # # # I V # T U C S A R # O
6E E # E # Y # # T I # A L E I U E # # L
7T N # T # P # O R # E N T V N V # # A K
8L T # I # T R U # R E E E I R # # # U R
9I I # E # I S # H R D T T E # # S C T O
10F C # R N O # T A N H N S L # L # I H W
11T A # G # N E B O R O Y L # E E R M O O
12E T # # # V I I E C X A # V G E A O R R
13K I # # I L S A S O W # E A I N # N I K
14C O # T I U T S R E # L R T A # # O Z S
15A N C T R S E P R # D O O G # # # G A T
16P A Y T E N # I # I T W E # # # # R T A
17# # N R I N F R A S T R U C T U R E I T
18# I V S E C U R I T Y P O L I C Y # O I
19# E U T I L I Z A T I O N # # # # # N O
20R B A C K U P P R O G R A M S # # # # N
Word X Y Direction
ACTIVETHREATS  216ne
AUTHENTICATION  22s
AUTHORIZATION  197s
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  62s
ERGONOMIC  1817n
FIREWALL  717ne
INFRASTRUCTURE  517e
INTRUSIONDETECTION  218ne
MANAGEMENT  132w
MANAGER  1811sw
MONITORING  132sw
PACKETFILTERS  116n
PASSIVETHREATS  192sw
PLATFORM  73e
POLICYMANAGEMENT  182w
PROXYSERVERS  815ne
RAIDLEVELS  818ne
SECURITYPOLICY  418e
SERVER  615sw
STORAGE  1017ne
THREETIER  42s
TWOTIER  1117ne
UTILIZATION  319e
VIRUS  115sw
VULNERABILITY  154sw
WORKLOAD  2010n
WORKSTATION  2011s
WORM  81e