Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

P J A C E R V A U T H O R I Z A T I O N
C E N C R Y P T I O N E R X K E Q S N T
O I C T N E M E G A N A M Y C I L O P I
L Y M N T G N I R O T I N O M Q I T A R
D L T O A C T I V E T H R E A T S Y S N
A E A I N U T H T I O G G H C W E C S O
O R Q W L O N J R J R Z E E V O R I I I
L U S N E I G I Y E K U T D B R V L V T
K T S R J R B R T C E E S M J K E O E A
R C P R E N I A E N D T P V T S R P T C
O U L R E T O F R N O I I X H T B Y H I
W R A E I V L I O E E C G E L A V T R T
O T T I E R R I T J N Z S C R T I I E N
R S F T N U S E F A O L D S C I U R A E
M A O O D U I N S T Z E U C E O Z U T H
L R R W R R O G O Y E I C V V N W C S T
Z F M T U C C D A N X K L W O T I E C U
U N N M A N A G E R U O C I G L K S S A
G I O S L E V E L D I A R A T W P L U J
E G A R O T S M A R G O R P P U K C A B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # # # # A U T H O R I Z A T I O N
2C E N C R Y P T I O N # # # # # # # N #
3# I C T N E M E G A N A M Y C I L O P #
4L Y M N # G N I R O T I N O M # I # A #
5D L T O A C T I V E T H R E A T S Y S N
6A E A I N U # H # I # # # # C W E C S O
7O R # W L O N # R # R # # E # O R I I I
8L U S # E I G I # E # U T # # R V L V T
9K T S R # R B R T # E E S # # K E O E A
10R C P R E N I A E N D T # # # S R P T C
11O U L R E T O F R N O # I # # T # Y H I
12W R A E # V L I O E # C # E # A # T R T
13O T T I # # R I T # N # S # R T # I E N
14R S F T # # S E F A # L # S # I # R A E
15M A O O # U # # S T Z # U # E O # U T H
16# R R W R # # # # Y E I # V # N # C S T
17# F M T # # # # # # X K L # # # I E # U
18# N N M A N A G E R # O C I # # # S # A
19# I # S L E V E L D I A R A T # # # U #
20E G A R O T S M A R G O R P P U K C A B
Word X Y Direction
ACTIVETHREATS  55e
AUTHENTICATION  2018n
AUTHORIZATION  81e
BACKUPPROGRAMS  2020w
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  22e
ERGONOMIC  910nw
FIREWALL  811nw
INFRASTRUCTURE  219n
INTRUSIONDETECTION  219ne
MANAGEMENT  133w
MANAGER  418e
MONITORING  154w
PACKETFILTERS  1520nw
PASSIVETHREATS  193s
PLATFORM  310s
POLICYMANAGEMENT  183w
PROXYSERVERS  1420nw
RAIDLEVELS  1319w
SECURITYPOLICY  1818n
SERVER  175s
STORAGE  720w
THREETIER  75se
TWOTIER  417n
UTILIZATION  1620nw
VIRUS  95se
VULNERABILITY  1416nw
WORKLOAD  112n
WORKSTATION  167s
WORM  112s