Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

A N I N T R U S I O N D E T E C T I O N
O E M R O F T A L P N S N H I P O C O T
V S C J E Y J H B O O R C R C C M R O W
V A P N G G I K E L I E R E U J E D K O
U S R E A L A P P I T T Y E P A R Y L T
L L O T U U Q N X C A L P T A C U C X I
N E X Q T T N S A Y T I T I S C T I L E
E V Y O H I Y I S M S F I E S Q C L N R
R E S W E L H U T A K T O R I R U O O K
A L E J N I F W A N R E N E V Z R P I U
B D R Z T Z I G E A O K H V E U T Y T M
I I V E I A R N R G W C N R T I S T A L
L A E R C T E I H E O A S E H P A I Z X
I R R G A I W R T M R P T S R E R R I G
T A S O T O A O E E K G O Z E X F U R L
Y X J N I N L T V N L S R P A N N C O L
Q K W O O G L I I T O G A C T G I E H M
U D H M N C R N T F A P G V S J H S T C
H X S I K U P O C S D O E A I S Y K U G
Y R Y C S D S M A R G O R P P U K C A B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # I N T R U S I O N D E T E C T I O N
2# E M R O F T A L P N S N H # # # # # T
3# # C # E # # # # O O R C R # # M R O W
4V # P N # G # # # L I E R E # # E # # O
5U S R # A # A # # I T T Y E P # R Y # T
6L L O # U U # N # C A L P T A # U C # I
7N E X # T T N # A Y T I T I S # T I # E
8E V Y # H I # I S M S F I E S # C L N R
9R E S # E L # # T A K T O R I # U O O #
10A L E # N I F # A N R E N E V # R P I #
11B D R # T Z I G E A O K # V E # T Y T #
12I I V E I A R N R G W C # R T # S T A #
13L A E R C T E I H E O A S E H # A I Z #
14I R R G A I W R T M R P T S R # R R I #
15T # S O T O A O E E K # O # E # F U R #
16Y # # N I N L T V N L # R # A N N C O #
17# # # O O # L I I T O # A # T # I E H #
18# # # M N # R N T # A # G # S # # S T #
19# # # I # U # O C # D # E # # # # # U #
20# # # C S # S M A R G O R P P U K C A B
Word X Y Direction
ACTIVETHREATS  920n
AUTHENTICATION  55s
AUTHORIZATION  1920n
BACKUPPROGRAMS  2020w
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  131s
ERGONOMIC  412s
FIREWALL  710s
INFRASTRUCTURE  1717n
INTRUSIONDETECTION  31e
MANAGEMENT  108s
MANAGER  108nw
MONITORING  820n
PACKETFILTERS  1214n
PASSIVETHREATS  155s
PLATFORM  102w
POLICYMANAGEMENT  101s
PROXYSERVERS  34s
RAIDLEVELS  214n
SECURITYPOLICY  1818n
SERVER  1414n
STORAGE  1313s
THREETIER  141s
TWOTIER  202s
UTILIZATION  66s
VIRUS  916sw
VULNERABILITY  14s
WORKLOAD  1112s
WORKSTATION  1111n
WORM  203w