Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

R E G A N A M O N I T O R I N G R O H X
N N V V E M M R O F T A L P N R I S Y E
P O L I C Y M A N A G E M E N T R R C M
A A I X D A O L K R O W L M K E N N S R
S U P T S T A E R H T E V I T C A P B O
S U T V C Q D T M W H U R L Z U U E F W
I E D H R E E A O G L Y I N N R T R L O
V R C Y O T T T Q N S F T I T O H U P R
E G N U D R I E E H T H T L O A E T R K
T O O V R E I R D E L N H S N N N C O S
H N I U R I A Z K N O L L J C W T U X T
R O T D E B T C A C O E A R H H I R Y A
E M A G I G A Y S T V I Y W R T C T S T
A I Z L V P A S P E I P S E E U A S E I
T C I I N O E R L O T O E U U R T A R O
S T L K P N D D O I L T N S R F I R V N
Y D I A I N I Y O T I I V J U T O F E Z
J H T S G A W N O E S B C U U R N N R P
A E U B R P I A R G D C Q Y V D I I S H
J B A C K U P P R O G R A M S E R V E R
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1R E G A N A M O N I T O R I N G # # # #
2N # # # # # M R O F T A L P # # # S # E
3P O L I C Y M A N A G E M E N T R # C M
4A # I # D A O L K R O W # # # E # N # R
5S U # T S T A E R H T E V I T C A # # O
6S # T # C # # # # W # U # L # U U E # W
7I E # H # E # # O # L # I # N # T R # O
8V R C # O # T T # N # F # I # # H U P R
9E G N U # R I E E # T # T # # # E T R K
10T O O # R E I R D E L N # S # N N C O S
11H N I # R I A Z K N O L L # C # T U X T
12R O T # E B T C A C O E A R # H I R Y A
13E M A # I G A Y S T V I Y W R # C T S T
14A I Z L # P A S P E I P S E E # A S E I
15T C I # # # E R L O T O E U # R T A R O
16S T L # # N # D O I L T N S R # I R V N
17Y # I # I # I # O T I I # # U T O F E #
18# # T S # A # N # E S # C # # R N N R #
19# # U # R # # # R # # # # Y # # I I S #
20# B A C K U P P R O G R A M S E R V E R
Word X Y Direction
ACTIVETHREATS  175w
AUTHENTICATION  175s
AUTHORIZATION  14se
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  179sw
ERGONOMIC  27s
FIREWALL  1817nw
INFRASTRUCTURE  1819n
INTRUSIONDETECTION  1819nw
MANAGEMENT  73e
MANAGER  71w
MONITORING  71e
PACKETFILTERS  614ne
PASSIVETHREATS  13s
PLATFORM  142w
POLICYMANAGEMENT  23e
PROXYSERVERS  198s
RAIDLEVELS  519ne
SECURITYPOLICY  16se
SERVER  1520e
STORAGE  1118nw
THREETIER  1711sw
TWOTIER  115sw
UTILIZATION  319n
VIRUS  1820nw
VULNERABILITY  135sw
WORKLOAD  124w
WORKSTATION  207s
WORM  206n