Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

N P E T S S T A E R H T E V I T C A I N
H O A U T H E N T I C A T I O N T R J B
I L I S S H F I R E W A L L P V E T U A
C I S T S U R H N U S S P Q L G N S T C
S C K T C I R E X O L O F A A X I E I K
P Y Y A O E V I E E I A Y N S N R C L U
R M T M S R T E V T R T A P E T D U I P
O A I C O K A E T C I M A S K T A R Z P
X N L K C N L G D H X E S T W J O I A R
Y A I I X D I V E N R C R O S D L T T O
S G B V I U R T P G O E T S U K K Y I G
E E A A K Y A R O N D I A B T Z R P O R
R M R X D G A N T R E H S T M Q O O N A
V E E E P T O I Q R I T P U S J W L W M
E N N C T M N P T J Q N C V R Q F I O S
R T L T I U T Z Q V O R G Y D T M C R Z
S Q U C A U T H O R I Z A T I O N Y M F
J P V N E R U T C U R T S A R F N I L B
L R C S H E D S R E T L I F T E K C A P
S E N C R Y P T I O N P L A T F O R M I
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1N P # # # S T A E R H T E V I T C A # #
2# O A U T H E N T I C A T I O N # R # B
3# L I S S H F I R E W A L L # # E # U A
4# I S T S U R # N # # S # # # G # S T C
5# C # T C I R E # O L # # # A # I E I K
6P Y Y # O E V I E E I # # N # N # C L U
7R M T M # R T E V T # T A # E # D U I P
8O A I # O # A E T # I M A S # T A R Z P
9X N L # # N L G D H # E S T W # O I A R
10Y A I # # D I # E N R C R O S # L T T O
11S G B # I # # T # G O E T # # K K Y I G
12E E A A # # # # O N # I A # # # R P O R
13R M R # # # # N T R E # S T # # O O N A
14V E E # # # O I # R I # # U S # W L W M
15E N N # # M N # # # # N # # R # # I O S
16R T L # I U # # # # # # G # # T # C R #
17S # U C A U T H O R I Z A T I O N Y M #
18# # V N E R U T C U R T S A R F N I # #
19# # C # # # # S R E T L I F T E K C A P
20# E N C R Y P T I O N P L A T F O R M #
Word X Y Direction
ACTIVETHREATS  181w
AUTHENTICATION  32e
AUTHORIZATION  517e
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  220e
ERGONOMIC  129sw
FIREWALL  73e
INFRASTRUCTURE  1818w
INTRUSIONDETECTION  1818nw
MANAGEMENT  27s
MANAGER  128ne
MONITORING  47se
PACKETFILTERS  2019w
PASSIVETHREATS  21se
PLATFORM  1220e
POLICYMANAGEMENT  22s
PROXYSERVERS  16s
RAIDLEVELS  313ne
SECURITYPOLICY  184s
SERVER  111s
STORAGE  34se
THREETIER  52se
TWOTIER  168sw
UTILIZATION  193s
VIRUS  97nw
VULNERABILITY  318n
WORKLOAD  1714n
WORKSTATION  1813nw
WORM  1914s