Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

K M P D Q B P R O X Y S E R V E R S P N
D B R S T N E M E G A N A M Y C I L O P
A A U O A C T I V E T H R E A T S I O A
O C J S F U Q G F I V M N C K T T P U S
L K E B I T T N N W R C M I X C S T K S
K U R P O N A H C I R U D D E H H Z E I
R P U I A A E L O Y R I S T E E R C W V
O P T T K C A S P R L O E R N I U U U E
W R C S I U K T S L I D T T E R D L G T
O O U M O L I E L C N Z I I I I N P H H
R G R H M O I A T O O C A T N E T R U R
M R T K N U W Z I F A N Y T R O E O A E
D A S D S E V S A T I P T A I E M I W A
P M A T R T U R I T O L B I T O D C X T
Q S R I O R A O E L I I T I N L N F R S
G E F F T R N T I G L O E E E U U Y N S
X R N N E M A C I I A R N V R D A O F M
W V I G C Z Y G T O N N E M O S B N D R
P E K C M R A Y E P N L A Y D C P Y C Q
K R L Z E O E K H Y S C I M O N O G R E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# M # # # # P R O X Y S E R V E R S # N
2D B R # T N E M E G A N A M Y C I L O P
3A A U O A C T I V E T H R E A T S I # A
4O C # S F U # G # I # # N # # # T # U S
5L K E # I T T # N # R C # # # C # T # S
6K U R P # N A H # I R U # # E # H # E I
7R P U # A # E L O Y R # S T # E # C # V
8O P T T # C # S P R # O E R N # U # U E
9W R C # I # K T S L I D T T E R # L # T
10O O U # # L I E L C N Z I I I I N # H H
11R G R # # O I A T O O C A T N E T R # R
12M R T K N # W Z I F A N Y T R O E O A E
13# A S # S E # S A T I P T A I E M I W A
14# M A T R T U R I T O L B I T O D # # T
15# S R I O R A O E L I I T I N L N # # S
16# E F # T R N T I G L O E E E U # # # #
17# R N N # # A C I I A R N V R # A # # #
18# V I # # # Y G T O # N E # # S # N # #
19# E # # # # # Y E # N L A # # # # # C #
20# R # # # # # # # # S C I M O N O G R E
Word X Y Direction
ACTIVETHREATS  53e
AUTHENTICATION  203sw
AUTHORIZATION  53se
BACKUPPROGRAMS  22s
BUSINESSCONTINUANCE  1111se
ENCRYPTION  143sw
ERGONOMIC  2020w
FIREWALL  316ne
INFRASTRUCTURE  318n
INTRUSIONDETECTION  318ne
MANAGEMENT  142w
MANAGER  1420nw
MONITORING  1713nw
PACKETFILTERS  46se
PASSIVETHREATS  202s
PLATFORM  98nw
POLICYMANAGEMENT  192w
PROXYSERVERS  71e
RAIDLEVELS  2011sw
SECURITYPOLICY  205sw
SERVER  215s
STORAGE  313se
THREETIER  209sw
TWOTIER  2014nw
UTILIZATION  37se
VIRUS  93se
VULNERABILITY  207sw
WORKLOAD  19n
WORKSTATION  210se
WORM  19s