Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

L F I R E W A L L Y B I P G X W D F I C
X B B P A S S I V E T H R E A T S O J S
Y T U T I L I Z A T I O N R M S H B A P
N W P S E C U R I T Y P O L I C Y V S A
X O N O I T C E T E D N O I S U R T N I
S R I Q L N S R E V R E S Y X O R P H N
U K C T K I E A W A I P L A T F O R M F
R S P C A X C S U I S L E V E L D I A R
I T Q B Y C J Y S T O R A G E M M H M A
V A M M M L I J M C H C E Y R E V R E S
A T Q M F P Y T G A O O I R E I T O W T
J I H T U W G Z N N N N R M A N A G E R
N O I T P Y R C N E I A T I O E M I F U
T N X M B B P S G W H R G I Z N T S J C
D D G R E I T E E R H T O E N A O P P T
J M R O W O R K L O A D U T M U T G K U
E S T A E R H T E V I T C A I E A I R R
E D P A C K E T F I L T E R S N N N O E
P D V V U L N E R A B I L I T Y O T C N
Z I E D M B A C K U P P R O G R A M S E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# F I R E W A L L # # # # # # # # # # #
2# B # P A S S I V E T H R E A T S # # #
3# # U T I L I Z A T I O N # # # # # # #
4N W P S E C U R I T Y P O L I C Y # # #
5# O N O I T C E T E D N O I S U R T N I
6S R I # L N S R E V R E S Y X O R P # N
7U K # T # I E A # # # P L A T F O R M F
8R S # # A # C S U # S L E V E L D I A R
9I T # # # C # Y S T O R A G E # # # # A
10V A # # # # I # M C H C # # R E V R E S
11# T # # # # # T G A O O I R E I T O W T
12# I # # # # # # N N N N R M A N A G E R
13N O I T P Y R C N E I A T I O # # # # U
14# N # # # # # # # # H R G I Z N # # # C
15# # # R E I T E E R H T O E N A O # # T
16# M R O W O R K L O A D U T M U T G # U
17# S T A E R H T E V I T C A I E A I R R
18# # P A C K E T F I L T E R S N N N O E
19# # # V U L N E R A B I L I T Y O T C N
20# # # # # B A C K U P P R O G R A M S E
Word X Y Direction
ACTIVETHREATS  1417w
AUTHENTICATION  1417nw
AUTHORIZATION  87se
BACKUPPROGRAMS  620e
BUSINESSCONTINUANCE  1111se
ENCRYPTION  1013w
ERGONOMIC  2018nw
FIREWALL  21e
INFRASTRUCTURE  205s
INTRUSIONDETECTION  205w
MANAGEMENT  910se
MANAGER  1412e
MONITORING  1820nw
PACKETFILTERS  318e
PASSIVETHREATS  42e
PLATFORM  127e
POLICYMANAGEMENT  45se
PROXYSERVERS  186w
RAIDLEVELS  208w
SECURITYPOLICY  44e
SERVER  2010w
STORAGE  99e
THREETIER  1215w
TWOTIER  2011w
UTILIZATION  33e
VIRUS  110n
VULNERABILITY  419e
WORKLOAD  516e
WORKSTATION  25s
WORM  516w