Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

J K G M T S E C U R I T Y P O L I C Y M
B B V U L N E R A B I L I T Y P R W V U
A P U H D L E S R E V R E S K A E W K S
C L T S F I A M G R E I T O W T I O T T
K A I T I U N W E K U A M S G I T R G A
U T L O Q N O F E G E M D A D M E K C E
P F I R M R E V R R A I D L E V E L S R
P O Z A M R L S H A I N Z C E R R O I H
R R A G A O M T S X S F A O W A H A P T
O M T E R V E R M C A T Z M K O T D S E
G D I J J V K I E V O W R B Y S U R I V
R M O N I T O R I N G N K U V C V T V I
A I N T R U S I O N D E T E C T I O N S
M Y C E R G O N O M I C B I N T Q L U S
S A U T H O R I Z A T I O N N E U F O A
G S R E T L I F T E K C A P Q U O R J P
K Y J N O I T A C I T N E H T U A P E H
N Y B F R S R E V R E S Y X O R P N O G
M A N A G E R E N C R Y P T I O N L C Q
P W O R K S T A T I O N Z F X L L E D E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # T S E C U R I T Y P O L I C Y #
2B B V U L N E R A B I L I T Y # R # # #
3A P U # # L E # R E V R E S # # E W # S
4C L T S # I A M # R E I T O W T I O # T
5K A I T I # N W E # # A # # # # T R # A
6U T L O # N O F E G E # # # # # E K # E
7P F I R # R E # R R A I D L E V E L S R
8P O Z A M # # S H A I N # # # # R O # H
9R R A G # # # T S # S F A # # # H A # T
10O M T E # # E # # C # T # M # # T D # E
11G # I # # V # # # # O # R # Y S U R I V
12R M O N I T O R I N G N # U # C # # # I
13A I N T R U S I O N D E T E C T I O N S
14M # C E R G O N O M I C # I # T # L # S
15S A U T H O R I Z A T I O N N # U # O A
16# S R E T L I F T E K C A P # U # R # P
17# # # N O I T A C I T N E H T U A # E #
18# # # # # S R E V R E S Y X O R P N # #
19M A N A G E R E N C R Y P T I O N # C #
20# W O R K S T A T I O N # # # # # # # E
Word X Y Direction
ACTIVETHREATS  215ne
AUTHENTICATION  1717w
AUTHORIZATION  215e
BACKUPPROGRAMS  12s
BUSINESSCONTINUANCE  1111se
ENCRYPTION  819e
ERGONOMIC  414e
FIREWALL  129nw
INFRASTRUCTURE  64se
INTRUSIONDETECTION  213e
MANAGEMENT  1410nw
MANAGER  119e
MONITORING  212e
PACKETFILTERS  1416w
PASSIVETHREATS  2016n
PLATFORM  23s
POLICYMANAGEMENT  1915nw
PROXYSERVERS  1718w
RAIDLEVELS  107e
SECURITYPOLICY  61e
SERVER  143w
STORAGE  44s
THREETIER  1710n
TWOTIER  164w
UTILIZATION  33s
VIRUS  2011w
VULNERABILITY  32e
WORKLOAD  183s
WORKSTATION  320e
WORM  85sw