Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

R E V R E S T A E R H T E V I S S A P B
A I N T R U S I O N D E T E C T I O N B
I N P A C K E T F I L T E R S V L U U A
D F R O A G W O N V I R U S E I W S T C
L R O A U S F O X O L E M M C Y I E I K
E A X C U L P A R L I A K Y N N A C L U
V S Y T P T F M D K N T M C E D M U I P
E T S I M H H U O A L A A S V R K R Z P
L R E V G R Z E G N N O S T O R G I A R
S U R E J E C E N A I C A F S Q R T T O
T C V T I E R Z G T O T T D Y K W Y I G
O T E H C T C E A N I A O O V O R P O R
R U R R L I M X T X L C Z R T J W O N A
A R S E E E Y I I P N Y A I I N H L W M
G E M A N R N G W K C V E T C N M I O S
E I V T K U D O L P D R E M I E G C R M
Q H Q S A U T H O R I Z A T I O N Y M N
M P Y N H O H L L A W E R I F N N Y Q E
A X C Q H Y T I L I B A R E N L U V N X
S E N C R Y P T I O N C I M O N O G R E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1R E V R E S T A E R H T E V I S S A P #
2A I N T R U S I O N D E T E C T I O N B
3I N P A C K E T F I L T E R S # L # U A
4D F R # # # W # N V I R U S # I # S T C
5L R O A # # # O # O # # M # C # I E I K
6E A X C U # # # R # I A # Y # N # C L U
7V S Y T # T # M # K N T M # E # M U I P
8E T S I # H H # O A L A A S # R # R Z P
9L R E V # R # E G N N O S T O # # I A R
10S U R E # E # E N A I C A F S # # T T O
11T C V T # E R # G T O T T D # K W Y I G
12O T E H # T # E # N I A O # # O R P O R
13R U R R # I M # T # L C # R T # # O N A
14A R S E # E # I # P # # A I I # # L W M
15G E # A N R N # # # # # E T # N # I O S
16E # # T # U # # # # # R # # I # G C R #
17# # # S A U T H O R I Z A T I O N Y M #
18# # # N # # # L L A W E R I F # N # # #
19# # C # # Y T I L I B A R E N L U V # #
20# E N C R Y P T I O N C I M O N O G R E
Word X Y Direction
ACTIVETHREATS  45s
AUTHENTICATION  45se
AUTHORIZATION  517e
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  220e
ERGONOMIC  2020w
FIREWALL  1518w
INFRASTRUCTURE  22s
INTRUSIONDETECTION  22e
MANAGEMENT  137sw
MANAGER  135sw
MONITORING  87se
PACKETFILTERS  33e
PASSIVETHREATS  191w
PLATFORM  1014ne
POLICYMANAGEMENT  182sw
PROXYSERVERS  33s
RAIDLEVELS  11s
SECURITYPOLICY  184s
SERVER  61w
STORAGE  110s
THREETIER  67s
TWOTIER  1810sw
UTILIZATION  193s
VIRUS  104e
VULNERABILITY  1819w
WORKLOAD  74se
WORKSTATION  1813nw
WORM  1914s