Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

H U B L N B X S H T S R E V R E S O G H
M R O W O R K S T A T I O N F M R L U E
S G C O I A H B W L A K T Z A P D I C S
M R M R T I I H O Z E I B R R O N N V R
T E E K A D U B T D Z N G O L T A C X E
S G R L Z L V S I O Z O X L R U C I E T
Y A U O I E I P E X R Y A U N T T S L L
T N T A R V R V R P S W S I J I I T C I
I A C D O E U L P E E I T N B L V A F F
L M U G H L S U R R O N O E U I E E R T
I R R R T S K V I N O I R U L Z T R E E
B O T T U C E F D C T R A I V A H H I K
A F S D A R C E S P Y T G Y X T R T T C
R T A B S Q T S Y D B K E J X I E E E A
E A R D Y E E R G O N O M I C O A V E P
N L F Y C N C X S K M N B A E N T I R C
L P N T I N M O N I T O R I N G S S H K
U V I S E C U R I T Y P O L I C Y S T Y
V O U J N O I T A C I T N E H T U A P D
N B T N E M E G A N A M Y C I L O P M T
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # N # # # # # # R E V R E S # # #
2M R O W O R K S T A T I O N # M # # # E
3# # # O I A # # W # # # # # A P # I C S
4# R # R T I # # O # # # # R R # N N # R
5# E E K A D # # T # # # G O L T A # # E
6# G R L Z L V # I # # O X L R U C # # T
7Y A U O I E I # E # R Y A U N T T S # L
8T N T A R V R # R P S W S I # I I T # I
9I A C D O E U # P E E I T N # L V A # F
10L M U # H L S U R R O N O # # I E E R T
11I R R # T S K V I N O I R # # Z T R E E
12B O T # U C E F D C T # A # # A H H I K
13A F S # A R # E S P # # G # # T R T T C
14R T A B S # T S Y # # # E # # I E E E A
15E A R # # E E R G O N O M I C O A V E P
16N L F # C N C # # # # # # # # N T I R #
17L P N T I N M O N I T O R I N G S S H #
18U # I S E C U R I T Y P O L I C Y S T #
19V O U # N O I T A C I T N E H T U A # #
20N B T N E M E G A N A M Y C I L O P # #
Word X Y Direction
ACTIVETHREATS  175s
AUTHENTICATION  1819w
AUTHORIZATION  513n
BACKUPPROGRAMS  414ne
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  518ne
ERGONOMIC  715e
FIREWALL  812ne
INFRASTRUCTURE  318n
INTRUSIONDETECTION  183sw
MANAGEMENT  1220w
MANAGER  210n
MONITORING  717e
PACKETFILTERS  2015n
PASSIVETHREATS  1820n
PLATFORM  217n
POLICYMANAGEMENT  1720w
PROXYSERVERS  163sw
RAIDLEVELS  62s
SECURITYPOLICY  418e
SERVER  171w
STORAGE  138s
THREETIER  1918n
TWOTIER  92s
UTILIZATION  166s
VIRUS  76s
VULNERABILITY  119n
WORKLOAD  42s
WORKSTATION  52e
WORM  42w