Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

V U E P O L I C Y M A N A G E M E N T G
U E S O U I R W R D N B C G F O B X M P
P I C B X N G K E A O M T P Y N Q Z I W
A P S N Q T X F G O I P I L X I E H D F
C A K X A R U I A L T L V K H T R Y X K
K S U C U U Q G N K A A E O N O U C G F
E S H T T S N I A R T T T N O R T I S S
T I V Q H I O I M O S F H E I I C L R M
F V L Z E O O M T W K O R G T N U O E A
I E C I N N R U R N R R E A P G R P V R
L T I K T D A I A O O M A R Y W T Y R G
T H M R I E I U Z P W C T O R A S T E O
E R O E C T D F M A X R S T C K A I S R
R E N I A E L K B U T E E S N D R R Y P
S A O T T C E F D M R I L I E B F U X P
C T G E I T V Q P V P X O G T N N C O U
H S R E O I E Y E N F K N N O O I E R K
C M E R N O L R F I R E W A L L W S P C
D J F H W N S G N O I T A Z I L I T U A
I M Y T I L I B A R E N L U V I R U S B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # P O L I C Y M A N A G E M E N T #
2# E # # # I # # R D N # C # # O # # # #
3P # C # # N # # E A O # T # # N # # # #
4A P # N # T # # G O I P I # # I E # # #
5C A # # A R # # A L T L V # # T R Y # #
6K S U # U U # # N K A A E # N O U C # #
7E S # T T S N # A R T T T # O R T I S S
8T I # # H I # I M O S F H E I I C L R M
9F V # # E O # M T W K O R G T N U O E A
10I E C # N N R # R N R R E A P G R P V R
11L T I # T D A I # O O M A R Y # T Y R G
12T H M R I E I # Z # W C T O R # S T E O
13E R O E C T D # # A # R S T C # A I S R
14R E N I A E L # # # T E E S N # R R Y P
15S A O T T C E # # # R I # I E # F U X P
16# T G E I T V # # V # # O # T N N C O U
17# S R E O I E # E # # # # N # O I E R K
18# # E R N O L R F I R E W A L L W S P C
19# # # H # N S # N O I T A Z I L I T U A
20# # Y T I L I B A R E N L U V I R U S B
Word X Y Direction
ACTIVETHREATS  131s
AUTHENTICATION  55s
AUTHORIZATION  25se
BACKUPPROGRAMS  2020n
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  1515n
ERGONOMIC  318n
FIREWALL  918e
INFRASTRUCTURE  1717n
INTRUSIONDETECTION  62s
MANAGEMENT  101e
MANAGER  98n
MONITORING  161s
PACKETFILTERS  13s
PASSIVETHREATS  24s
PLATFORM  124s
POLICYMANAGEMENT  51e
PROXYSERVERS  1918n
RAIDLEVELS  710s
SECURITYPOLICY  1818n
SERVER  1313sw
STORAGE  1414n
THREETIER  420n
TWOTIER  1819nw
UTILIZATION  1919w
VIRUS  1520e
VULNERABILITY  1520w
WORKLOAD  109n
WORKSTATION  1111n
WORM  1112nw