Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

V N O I T C E T E D N O I S U R T N I Q
F T P A C K E T F I L T E R S W R U E B
Q Y O A U T H O R I Z A T I O N G S U A
Z F L U S Y N U N I R T K R N G K S T C
P R I T S S F D M O Q E K S D F I E I K
L Y C H T T I P E Z I L W C X N N C L U
A T Y E A O T V Q P O T R A E L F U I P
T I M N E R I I E A M E A S L M R R Z P
F L A T R A H R D T I G S T O L A I A R
O I N I H G G U G T H C Z N S T S T T O
R B A C T E M S E Z O R I I S K T Y I G
M A G A E P Q E W N A T E Z W W R P O R
A R E T V D R I T I O R N A O A U O N A
N E M I I H V I D R G V X T T X C L W M
A N E O T J N L I O D L I M G S T I O S
G L N N C U E N N A F E I F L C U C R E
E U T R A V G O H L R M Q L C Y R Y M R
R V J N E F M N O I T P Y R C N E C E V
L R C L H I X P V W L E W G A Y L J B E
K E S X C P R O X Y S E R V E R S K U R
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# N O I T C E T E D N O I S U R T N I #
2# # P A C K E T F I L T E R S W # # # B
3# # O A U T H O R I Z A T I O N # # U A
4# # L U S # # # N # R # # R # # # S T C
5P # I T S S # # # O # E K # # # I E I K
6L Y C H T T I # # # I L W # # N N C L U
7A T Y E A O # V # # O T R A E # F U I P
8T I M N E R # I E A # E A S L M R R Z P
9F L A T R A # R D T I # S T O L A I A R
10O I N I H G # U # T H C # N S # S T T O
11R B A C T E # S E # O R I # # K T Y I G
12M A G A E # # E # N A T E # # W R P O R
13A R E T V # R # T I O R # A O # U O N A
14N E M I I H # I D R G # # T T # C L W M
15A N E O T # N L I O # # I # # S T I O S
16G L N N C U E N N # # E # # # # U C R E
17E U T # A V G O # # R # # # # # R Y M R
18R V # N E # M N O I T P Y R C N E # # V
19# # C L # I # # # # # # # # # # # # # E
20# E S # C P R O X Y S E R V E R S # # R
Word X Y Direction
ACTIVETHREATS  517n
AUTHENTICATION  43s
AUTHORIZATION  43e
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  1718w
ERGONOMIC  1312sw
FIREWALL  92se
INFRASTRUCTURE  175s
INTRUSIONDETECTION  191w
MANAGEMENT  38s
MANAGER  112s
MONITORING  168sw
PACKETFILTERS  32e
PASSIVETHREATS  32se
PLATFORM  15s
POLICYMANAGEMENT  31s
PROXYSERVERS  620e
RAIDLEVELS  1211sw
SECURITYPOLICY  184s
SERVER  2015s
STORAGE  65s
THREETIER  515ne
TWOTIER  1711sw
UTILIZATION  193s
VIRUS  87s
VULNERABILITY  218n
WORKLOAD  162sw
WORKSTATION  1813nw
WORM  1914s