Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

A D F I R E W A L L Z U N R E G A N A M
N E N C R Y P T I O N F O U H H Z E H P
B U C U C S G N I R O T I N O M G E S G
E E P N A H J O F B I H T W O T I E R V
S Q O R A U T H E N T I C A T I O N V P
I F L K C U A N G S A F E S D K W S U N
N P I P T T N H O W T N T S A C U O L O
F A C A I I D I S M S N E I O I T P N I
R C Y S V L X Q T R K L D C L M F S E T
A K M S E I U M H N R Z N E K O L T R A
S E A I T Z Z E R M O A O C R N S O A Z
T T N V H A W X E R W C I V O O S R B I
R F A E R T I V E O O D S D W G U A I R
U I G T E I R X T F R W U S L R R G L O
C L E H A O O O I T M T R C E E I E I H
T T M R T N J I E A T X T P K N V J T T
U E E E S T C E R L H R N D B Y I E Y U
R R N A Y C I L O P Y T I R U C E S L A
E S T T P R O X Y S E R V E R S M T U S
R K B S K I S M A R G O R P P U K C A B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # F I R E W A L L # # N R E G A N A M
2# E N C R Y P T I O N # O # # # # # # #
3# # C # # # G N I R O T I N O M # # # #
4# # P N # # # # # # I # T W O T I E R #
5# # O # A U T H E N T I C A T I O N V #
6I # L # C U # # # # A # E # D # # # U N
7N P I P T T N # # # T # T # A C # # L O
8F A C A I I # I # # S # E # O I # # N I
9R C Y S V L # # T # K # D # L M # S E T
10A K M S E I # # H N R # N # K O # T R A
11S E A I T Z # # R M O A O # R N # O A Z
12T T N V H A # # E R W C I # O O S R B I
13R F A E R T # # E O O # S D W G U A I R
14U I G T E I # # T F R # U S L R R G L O
15C L E H A O # # I T M # R # E E I E I H
16T T M R T N # # E A # # T # # N V # T T
17U E E E S # # # R L # # N # # # I E Y U
18R R N A Y C I L O P Y T I R U C E S L A
19E S T T P R O X Y S E R V E R S # # U S
20# # # S # # S M A R G O R P P U K C A B
Word X Y Direction
ACTIVETHREATS  55s
AUTHENTICATION  55e
AUTHORIZATION  2018n
BACKUPPROGRAMS  2020w
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  22e
ERGONOMIC  1615n
FIREWALL  31e
INFRASTRUCTURE  16s
INTRUSIONDETECTION  1318n
MANAGEMENT  310s
MANAGER  201w
MONITORING  163w
PACKETFILTERS  27s
PASSIVETHREATS  47s
PLATFORM  1018n
POLICYMANAGEMENT  35s
PROXYSERVERS  519e
RAIDLEVELS  1110se
SECURITYPOLICY  1818w
SERVER  1019e
STORAGE  189s
THREETIER  99s
TWOTIER  134e
UTILIZATION  66s
VIRUS  1716n
VULNERABILITY  195s
WORKLOAD  1513n
WORKSTATION  1111n
WORM  1112s