Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

Y T W A U T H E N T I C A T I O N Q S H
F E R E I T E E R H T V U N U R X I U H
M N C G N I G K X E H A J O K S G T R V
S C C N W O R K L O A D A I C R N L I U
A R S P A F I R E W A L L T I E I Y V L
C Y T R G U X T O Y Q X I C M T R C W N
T P A O S L N R A N S G H E O L O I U E
I T E X C L M I Y T I J G T N I T L N R
V I R Y Q N E J T O S A A E O F I O O A
E O H S N O N V J N N K E D G T N P I B
T N T E F I J A E A O Y R N R E O Y T I
H V E R H T O K M L O C F O E K M T A L
R K V V J A A Y A R D M S I W C W I Z I
E G I E M Z C U N Y D I Z S G A Q R I T
A O S R I I G W A X X Q A U E P N U R Y
T F S S L L C T G I O Q M R S N Y C O T
S U A O W I F R E I T O W T M K I E H V
L S P L A T F O R M K K N N Z P I S T C
E R U T C U R T S A R F N I Y L A D U O
E G A R O T S M A R G O R P P U K C A B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # A U T H E N T I C A T I O N # S #
2# E R E I T E E R H T # # N # # # # U #
3# N C # N # # # # # # # # O # S G T R V
4# C # N W O R K L O A D # I C R N # I U
5A R S P A F I R E W A L L T I E I Y V L
6C Y T R # U # T O # # # # C M T R C # N
7T P A O S # N R A # # # # E O L O I # E
8I T E X # L M I # T # # G T N I T L N R
9V I R Y # N E # T # S A # E O F I O O A
10E O H S # O # V # N N K # D G T N P I B
11T N T E # I # # E A O # R N R E O Y T I
12H # E R # T # # M L # C # O E K M T A L
13R # V V # A # Y A # D # S I W C # I Z I
14E # I E # Z C # N # # I # S # A # R I T
15A # S R # I # # A # # # A U E P # U R Y
16T # S S L L # # G # # # # R # N # C O #
17S # A O # I # R E I T O W T # # I E H #
18# # P L A T F O R M # # # N # # # S T #
19E R U T C U R T S A R F N I # # # # U #
20E G A R O T S M A R G O R P P U K C A B
Word X Y Direction
ACTIVETHREATS  15s
AUTHENTICATION  41e
AUTHORIZATION  1920n
BACKUPPROGRAMS  2020w
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  22s
ERGONOMIC  1512n
FIREWALL  65e
INFRASTRUCTURE  1419w
INTRUSIONDETECTION  1419n
MANAGEMENT  912ne
MANAGER  912s
MONITORING  1712n
PACKETFILTERS  1615n
PASSIVETHREATS  318n
PLATFORM  318e
POLICYMANAGEMENT  417ne
PROXYSERVERS  45s
RAIDLEVELS  1416nw
SECURITYPOLICY  1818n
SERVER  410s
STORAGE  720w
THREETIER  112w
TWOTIER  1417w
UTILIZATION  619n
VIRUS  195n
VULNERABILITY  203s
WORKLOAD  54e
WORKSTATION  1412nw
WORM  105sw