Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

T P M H X B W K N T P V I R U S M M D U
M O H D M R O W O R K S T A T I O N O E
R L F L Y T I L I B A R E N L U V I C N
O I N L E L Z Q T H R E E T I E R N P O
F C O Y R L V H C L S C C W Y X A I A I
T Y I C U C N W E P C E M O B U S A C T
A M T I T I O O T N Z H A T N T T X K A
L A A L C M I R E Z I Q S I R I A F E Z
P N C O U O T K D H I L T E K L E R T I
R A I P R N P L N Y J N A R L I R U F R
O G T Y T O Y O O Y O S E G M Z H F I O
X E N T S G R A I C V L R N L A T R L H
Y M E I A R C D S E Q E H I L T E E T T
S E H R R E N S U G X V T R A I V G E U
E N T U F U E E R A E E E O W O I A R A
R T U C N N R R T R P L V T E N S N S A
V F A E I S W V N O J D I I R Z S A O V
E T I S A E R E I T R I T N I L A M E I
R T U L H J L R B S D A C O F C P Z K W
S B A C K U P P R O G R A M S W C C H B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# P # # # # # # N # # V I R U S # # # #
2M O # # M R O W O R K S T A T I O N # E
3R L # # Y T I L I B A R E N L U V # C N
4O I N # E # # # T H R E E T I E R N P O
5F C O Y R # # # C # # # # W # # A # A I
6T Y I C U C N W E # # # # O # U S # C T
7A M T I T I O O T # # # # T N T T # K A
8L A A L C M I R E # # # S I # I A # E Z
9P N C O U O T K D # # # T E # L E # T I
10R A I P R N P L N # # N A R # I R # F R
11O G T Y T O Y O O # O S E G # Z H # I O
12X E N T S G R A I C # L R N L A T R L H
13Y M E I A R C D S E # E H I L T E E T T
14S E H R R E N S U G # V T R A I V G E U
15E N T U F # E E R A # E E O W O I A R A
16R T U C N N # R T R # L V T E N S N S #
17V # A E I # # V N O # D I I R # S A # #
18E # # S # # # E I T # I T N I # A M # #
19R # U # # # # R # S # A C O F # P # # #
20S B A C K U P P R O G R A M S # # # # #
Word X Y Direction
ACTIVETHREATS  1320n
AUTHENTICATION  317n
AUTHORIZATION  2015n
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  715n
ERGONOMIC  614n
FIREWALL  1519n
INFRASTRUCTURE  517n
INTRUSIONDETECTION  918n
MANAGEMENT  27s
MANAGER  1818n
MONITORING  1420n
PACKETFILTERS  194s
PASSIVETHREATS  1719n
PLATFORM  19n
POLICYMANAGEMENT  22s
PROXYSERVERS  19s
RAIDLEVELS  1220n
SECURITYPOLICY  418n
SERVER  814s
STORAGE  1019n
THREETIER  94e
TWOTIER  144s
UTILIZATION  166s
VIRUS  121e
VULNERABILITY  173w
WORKLOAD  86s
WORKSTATION  92e
WORM  82w