Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

D I R Q H Q P Y P R O X Y S E R V E R S
Y A E F T E Y C U A L H X M S I S O A E
J G V P W R T I E I L B R E R N Z B C N
W T R L O U I L R D A O K U N T Q N E C
H N E A T T L O G L W K S M O R A P O R
Y E S T I C I P O E E I W T S U U D M Y
C M T F E U B Y N V R C G T N S T A D P
N E A O R R A T O E I S A I N I H O S T
O G E R N T R I M L F E T O L O E L R I
I A R M E S E R I S R N I T L N N K E O
T N H A G A N U C H O T C E O D T R T N
A A T N A R L C T C A I G I N E I O L B
T M E A R F U E S Z S T T L Q T C W I P
S Y V G O N V S I C M A O F X E A Y F G
K C I E T I E R D C Z X V H R C T P T D
R I T R S N O R E I T E E R H T I I E Y
O L C S I H O V L Y G C E U Q I O W K L
W O A S T M L I S N I T S J X O N K C Q
Q P U U K Y T M O N I T O R I N G T A K
J B A C K U P P R O G R A M S J G X P X
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # R # # # # Y P R O X Y S E R V E R S
2# # E # T E Y C # A L # # M # I # # # E
3# # V P W R T I E I L # R # R N # # C N
4# T R L O U I L R D A O # U # T # N # C
5# N E A T T L O G L W # S # # R A # # R
6# E S T I C I P O E E # # # S U U D # Y
7# M T F E U B Y N V R # # T N S T A # P
8N E A O R R A T O E I # A I N I H O S T
9O G E R # T R I M L F E T O # O E L R I
10I A R M E S E R I S R N I # # N N K E O
11T N H A G A N U C H O T # # O D T R T N
12A A T N A R L C T C A # # I # E I O L #
13T M E A R F U E S Z # # T # # T C W I #
14S Y V G O N V S I # # A # # # E A # F #
15K C I E T I E R # # Z # # # # C T # T #
16R I T R S N O R E I T E E R H T I # E #
17O L C S I H # # L # # # # # # I O # K #
18W O A S T # # I # # # # # # # O N # C #
19# P U U # # T M O N I T O R I N G # A #
20# B A C K U P P R O G R A M S # # # P #
Word X Y Direction
ACTIVETHREATS  318n
AUTHENTICATION  175s
AUTHORIZATION  320ne
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  202s
ERGONOMIC  93s
FIREWALL  119n
INFRASTRUCTURE  615n
INTRUSIONDETECTION  162s
MANAGEMENT  213n
MANAGER  410s
MONITORING  819e
PACKETFILTERS  1920n
PASSIVETHREATS  219ne
PLATFORM  43s
POLICYMANAGEMENT  218n
PROXYSERVERS  91e
RAIDLEVELS  101s
SECURITYPOLICY  814n
SERVER  36n
STORAGE  516n
THREETIER  1616w
TWOTIER  52s
UTILIZATION  620ne
VIRUS  171sw
VULNERABILITY  714n
WORKLOAD  1813n
WORKSTATION  117n
WORM  115ne