Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

U P A S S I V E T H R E A T S E R V E R
E N O I T C E T E D N O I S U R T N I B
M R A L Q H W N O I T A Z I R O H T U A
O P G K I O R U C Z R W O R M N A S G C
N K P O T C I E P R O T V B O H I E Y K
I V H I N D Y L E R Y U O I V N K C S U
T I E E S O L M K T L P T Q E M W U R P
O R S D R A M S A N I A T S K P U R E P
R U T T W U T I E N Z E S I A B A I V R
I S D E A A T R C I A C R C O I A T R O
N F R A T E A C L B O G K S D N N Y E G
G I X I O B R I U N U E E L O Z E P S R
F Q O D I L T H T R T E E M P J L O Y A
P N J L X U K I T F T V G G E A M L X M
W C I K G C N R I E E S G A T N Z I O S
J T Y R D U M L O L V A A F R H T C R N
Y O S D A B T Z S W M I O R E O T Y P C
R J X N J E A A I O J R T U F A T F K U
J M C S R E G A N A M B H C H N V S I Z
Z E N S W A U T H E N T I C A T I O N A
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# P A S S I V E T H R E A T S E R V E R
2E N O I T C E T E D N O I S U R T N I B
3M R # L # H W N O I T A Z I R O H T U A
4O # G # I O R # C # # W O R M N # S # C
5N # # O T C # E # R O # V # O # I E # K
6I V # I N # Y L E R Y U # I # N # C S U
7T I E E # O L M K T L P T # E # # U R P
8O R S # R A M S A N I A T S # P # R E P
9R U # T W U T I E N Z E S I A # A I V R
10I S D E A A T R C I A C R C O I # T R O
11N # R A T E A C L # O G K # D N # Y E G
12G I # I O B R I U N # E E L # # # P S R
13F # O # I L T H T R T E E M # # L O Y A
14# N # L # U K I T F T V G # E A # L X M
15# # I # # # N R I E E S # A T N # I O S
16# T # # # U # L O L V # A F R # T C R #
17Y # # # A # T # S W # I O R # O # Y P #
18# # # N # E # # # # # R T # F # T # # #
19# # C # R E G A N A M # # C # N # S # #
20# E # S # A U T H E N T I C A T I O N #
Word X Y Direction
ACTIVETHREATS  1520nw
AUTHENTICATION  620e
AUTHORIZATION  203w
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  72se
ERGONOMIC  12se
FIREWALL  113ne
INFRASTRUCTURE  1720nw
INTRUSIONDETECTION  192w
MANAGEMENT  87se
MANAGER  1119w
MONITORING  13s
PACKETFILTERS  168sw
PASSIVETHREATS  21e
PLATFORM  1812sw
POLICYMANAGEMENT  32se
PROXYSERVERS  1917n
RAIDLEVELS  188sw
SECURITYPOLICY  184s
SERVER  151e
STORAGE  1819nw
THREETIER  52se
TWOTIER  82sw
UTILIZATION  614ne
VIRUS  26s
VULNERABILITY  135sw
WORKLOAD  1017nw
WORKSTATION  115sw
WORM  124e