Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

L P R O X Y S E R V E R S L G O S O A U
N B A C K U P P R O G R A M S S N X E X
O T U S T A E R H T E V I T C A F Z W F
I V T S T N E M E G A N A M Y C I L O P
T M H E I N F R A S T R U C T U R E Y A
C R O C N N L M N O I T A Z I L I T U S
E O R U V E E N C R Y P T I O N L T L S
T W I R U Q R S F T M R O C P P H W L I
E O Z I L H G T S E R V E R R E H O A V
D R A T N U O O S C G U S I N G R T W E
N K T Y E Q N R N F O N M T T C N I E T
O S I P R R O A Q P A N I A S E T E R H
I T O O A R M G Q P Z C T R N V E R I R
S A N L B P I E E G A B O I O A A R F E
U T H I I Y C G B T N T H F N T G G H A
R I V C L T V U I W I C X C U U I E Q T
T O I Y I P U O W O R K L O A D A N R S
N N R I T H N R A I D L E V E L S N O J
I L U O Y D Q Y S M R O F T A L P X C M
S X S R E T L I F T E K C A P N K F N E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# P R O X Y S E R V E R S # # # # # # #
2N B A C K U P P R O G R A M S # # # # #
3O # U S T A E R H T E V I T C A # # # #
4I # T S T N E M E G A N A M Y C I L O P
5T M H E I N F R A S T R U C T U R E # A
6C R O C # N # # N O I T A Z I L I T U S
7E O R U V # E N C R Y P T I O N # T L S
8T W I R U # R S # # # R # # # # H W L I
9E O Z I L # G T S E R V E R # E # O A V
10D R A T N # O O # C G # # I N # # T W E
11N K T Y E # N R # # O N M T T # # I E T
12O S I P R # O A # # # N I A # E # E R H
13I T O O A # M G # # # C T R N # E R I R
14S A N L B # I E # # A # # I O A # R F E
15U T # I I # C # # T # # # # N T G # H A
16R I V C L # # # I # # # # # # U I E # T
17T O I Y I # # O W O R K L O A D A N R S
18N N R # T # N R A I D L E V E L S N O #
19I # U # Y # # # # M R O F T A L P # C M
20# # S R E T L I F T E K C A P # # # # E
Word X Y Direction
ACTIVETHREATS  163w
AUTHENTICATION  205sw
AUTHORIZATION  32s
BACKUPPROGRAMS  22e
BUSINESSCONTINUANCE  1111se
ENCRYPTION  77e
ERGONOMIC  77s
FIREWALL  1914n
INFRASTRUCTURE  55e
INTRUSIONDETECTION  119n
MANAGEMENT  144w
MANAGER  1311se
MONITORING  2019nw
PACKETFILTERS  1520w
PASSIVETHREATS  204s
PLATFORM  1719w
POLICYMANAGEMENT  194w
PROXYSERVERS  21e
RAIDLEVELS  818e
SECURITYPOLICY  44s
SERVER  99e
STORAGE  88s
THREETIER  2016nw
TWOTIER  187s
UTILIZATION  196w
VIRUS  316s
VULNERABILITY  57s
WORKLOAD  917e
WORKSTATION  29s
WORM  28n