Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

T E W O R K L O A D J S T Y Y L M Y I K
Z B A C K U P P R O G R A M S E R V E R
I Z U T I L I Z A T I O N T E H H B D Z
N Y U S E C U R I T Y P O L I C Y L C O
T A S P I N F R A S T R U C T U R E W N
R S R R Q N H I E I Z W E N V R R O O V
U T E O A F E K R T D F O P J L R I R W
S A T X M C N S E E R L O T C M T Y K C
I E L Y A K C P S K W K E N I A P C S Z
O R I S N N R L T C T A I V Z E T I T M
N H F E A X Y A O M O H L I E W R M A O
D T T R G V P T R E N N R L A L C O T N
E E E V E R T F A K Y O T E N O S N I I
T V K E R S I O G G H J G I E Q W O O T
E I C R F U O R E T A Z U H N T Z G N O
C S A S J R N M U M D Y X W R U I R C R
T S P N O I T A C I T N E H T U A E I I
I A C T I V E T H R E A T S N B S N R N
O P O L I C Y M A N A G E M E N T U C G
N O W N N V U L N E R A B I L I T Y P E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # W O R K L O A D # # # # # # # # # #
2# B A C K U P P R O G R A M S E R V E R
3I # U T I L I Z A T I O N # # # # # # #
4N # # S E C U R I T Y P O L I C Y # # #
5T # S P I N F R A S T R U C T U R E W N
6R S R R # N # I # I # W # # # # # O O #
7U T E O # # E # R # D # O # # # R I R #
8S A T X M # N S # E # L # T # M T # K #
9I E L Y A # C P S # W # E # I A # C S #
10O R I S N # R L T C T A # V Z E # I T M
11N H F E A # Y A O # O H L I E # R M A O
12D T T R G # P T R # # N R L # L # O T N
13E E E V E # T F A # # O T E # # S N I I
14T V K E R S I O G # H # # I E # # O O T
15E I C R # U O R E T # # # # N T # G N O
16C S A S # R N M U # # # # # # U I R # R
17T S P N O I T A C I T N E H T U A E # I
18I A C T I V E T H R E A T S # # # N R N
19O P O L I C Y M A N A G E M E N T # C G
20N # # # # V U L N E R A B I L I T Y # E
Word X Y Direction
ACTIVETHREATS  218e
AUTHENTICATION  1717w
AUTHORIZATION  817ne
BACKUPPROGRAMS  22e
BUSINESSCONTINUANCE  1111se
ENCRYPTION  77s
ERGONOMIC  1817n
FIREWALL  75se
INFRASTRUCTURE  55e
INTRUSIONDETECTION  13s
MANAGEMENT  819e
MANAGER  58s
MONITORING  2010s
PACKETFILTERS  317n
PASSIVETHREATS  219n
PLATFORM  89s
POLICYMANAGEMENT  119e
PROXYSERVERS  45s
RAIDLEVELS  84se
SECURITYPOLICY  44e
SERVER  152e
STORAGE  99s
THREETIER  1110se
TWOTIER  115se
UTILIZATION  33e
VIRUS  618n
VULNERABILITY  620e
WORKLOAD  31e
WORKSTATION  196s
WORM  195sw