Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

A O U I Y Y K S P R M N Q O P E Z E W S
T Q Y Y L Y V R L C N O I T P Y R C N E
M X Y F B M U E A W O I R U E O F L C W
Z Y R B E S L T T O I T E K R R A N Q T
F B I Y R P N L F B T C I M G L A S H N
P A Y C U L E I O B A E T O O U U L Q E
R S D I T L R F R C T T O N N M T E S M
O M Q L C L A T M W S E W I O G H V T E
X A N O U A B E N O K D T T M O E E A G
Y R O P R W I K Q R R N H O I Y N L E A
S G I Y T E L C F M O O R R C F T D R N
E O T T S R I A V C W I E I F Y I I H A
R R A I A I T P S O M S E N P E C A T M
V P Z R R F Y S R A T U T G H N A R E Y
E P I U F G E K N O J R I G S B T E V C
R U L C N N L A R P M T E X U M I V I I
S K I E I O G A K A T N R E R S O R T L
D C T S A E G J N J C I Y A I M N E C O
Q A U D R E S T A E R H T E V I S S A P
H B Y A U T H O R I Z A T I O N F V Z C
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # # # # S P # # N # # # # # # # #
2# # # # # # V R L # N O I T P Y R C N E
3# # # # # # U E A # O I R # E # # # C #
4# # # # E # L T T # I T E # R # # N # T
5# # # Y R # N L F # T C I M G # A S # N
6P # # C U # E I O # A E T O O U U L # E
7R S # I T L R F R # T T O N N # T E S M
8O M # L C L A T M W S E W I O # H V T E
9X A N O U A B E # O K D T T M # E E A G
10Y R O P R W I K # R R N H O I # N L E A
11S G I Y T E L C # M O O R R C # T D R N
12E O T T S R I A # C W I E I # # I I H A
13R R A I A I T P S O M S E N # # C A T M
14V P Z R R F Y S R A T U T G # # A R E Y
15E P I U F # E K N O # R I # S # T E V C
16R U L C N N L A R # # T E # U # I V I I
17S K I E I O G A # # # N R # R # O R T L
18# C T S A E G # # # # I # # I # N E C O
19# A U D R E S T A E R H T E V I S S A P
20# B # A U T H O R I Z A T I O N # # # #
Word X Y Direction
ACTIVETHREATS  1919n
AUTHENTICATION  175s
AUTHORIZATION  420e
BACKUPPROGRAMS  220n
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  202w
ERGONOMIC  153s
FIREWALL  614n
INFRASTRUCTURE  517n
INTRUSIONDETECTION  1218n
MANAGEMENT  2013n
MANAGER  1113sw
MONITORING  145s
PACKETFILTERS  813n
PASSIVETHREATS  2019w
PLATFORM  91s
POLICYMANAGEMENT  2018n
PROXYSERVERS  16s
RAIDLEVELS  1814n
SECURITYPOLICY  418n
SERVER  1819n
STORAGE  1213sw
THREETIER  139s
TWOTIER  139n
UTILIZATION  319n
VIRUS  1519n
VULNERABILITY  72s
WORKLOAD  1112sw
WORKSTATION  1111n
WORM  108s