Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

F A K U Y X H G N I R O T I N O M J B J
I E S E R U T C U R T S A R F N I S J W
R N C R D W S Y T I L I B A R E N L U V
E C T N E T N O I T A Z I R O H T U A F
W R H N A T L S L E V E L D I A R Y N A
A Y R P E U L S D A O L K R O W U C N N
L P E A P M N I R E G A N A M O S I T S
L T E U A R E I F O X K O Y R R I L X M
J I T T S C O G T T S C L M O K O O N A
F O I H S T T X A N E M E G F S N P O R
E N E E I E O I Y N O K I B T T D Y I G
I W R N V A R R V S A C C V A A E T T O
T E V T E I E V A E E M S A L T T I A R
A U S I T C R L E G T R Y S P I E R Z P
C Y Q C H Z U U A R E H V C E O C U I P
K A U A R M Q S S K P S R E I N T C L U
K D S T E R G O N O M I C E R L I E I K
D Q Z I A O X Q P T K Z O F A S O S T C
H S G O T W O T I E R M P G E T N P U A
Y T W N S L W L D P B I F E B Y S V J B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1F # # # # # # G N I R O T I N O M # # #
2I E S E R U T C U R T S A R F N I # # #
3R N C R # # # Y T I L I B A R E N L U V
4E C T N E # N O I T A Z I R O H T U A #
5W R H N A T # S L E V E L D I A R Y # #
6A Y R # E U L # D A O L K R O W U C # #
7L P E A P M N I R E G A N A M O S I # S
8L T E U A R E I F # # # # # R R I L # M
9# I T T S C O G T T # # # # O K O O N A
10# O I H S T T X A N E # # # F S N P O R
11# N E E I E O I Y N O K # # T T D Y I G
12# # R N V # R R V S A C C # A A E T T O
13# # # T E I # V A E E M S A L T T I A R
14# # # I T # R # E G T R Y S P I E R Z P
15# # # C H # # U # R E H V C E O C U I P
16# # # A R M # # S # # # R E I N T C L U
17# # # T E R G O N O M I C E R L I E I K
18# # # I A O # # # # # # # # A S O S T C
19# # # O T W O T I E R # # # # T N P U A
20# # # N S # # # # # # # # # # # S # # B
Word X Y Direction
ACTIVETHREATS  58se
AUTHENTICATION  47s
AUTHORIZATION  194w
BACKUPPROGRAMS  2020n
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  22s
ERGONOMIC  517e
FIREWALL  11s
INFRASTRUCTURE  172w
INTRUSIONDETECTION  172s
MANAGEMENT  1213nw
MANAGER  157w
MONITORING  171w
PACKETFILTERS  1514nw
PASSIVETHREATS  57s
PLATFORM  1514n
POLICYMANAGEMENT  1718nw
PROXYSERVERS  57se
RAIDLEVELS  175w
SECURITYPOLICY  1818n
SERVER  510se
STORAGE  59se
THREETIER  34s
TWOTIER  519e
UTILIZATION  1919n
VIRUS  512se
VULNERABILITY  203w
WORKLOAD  166w
WORKSTATION  167s
WORM  619n