Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

K C M O N I T O R I N G R N D N C D C V
H H W P A G P T W O R K L O A D T E M B
I W Y L Q G A N O I T A Z I R O H T U A
N P U A N G C E R P W W R N L Y X S X C
T P S T O O K M K B O O E F F G I E L K
R U R F I N E E S C T R V R T N V C S U
U J E O T O T G T O I M R A E W D U T P
S R V R A I F A A P E M E S N L S R A P
I C R M C T I N T Q R W S T C F L I E R
O H E A I A L A I T W C R R R I E T R O
N R S N T Z T M O W O A E U Y R V Y H G
D C Y A N I E Y N N Q J I C P E E P T R
E I X G E L R C T O S X T T T W L O E A
T M O E H I S I Q U S V E U I A D L V M
E O R R T T N L U P C U E R O L I I I S
C N P D U U A O R O R R R E N L A C T R
T O J E A C W P L I L R H I Y W R Y C Q
I G U N I O S T A E R H T E V I S S A P
O R C Y T I L I B A R E N L U V E W I G
N E Z F S T O R A G E G P P K S J C V U
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # M O N I T O R I N G # # # # # # # #
2# # # P # # P T W O R K L O A D # # # B
3I # # L # # A N O I T A Z I R O H T U A
4N # # A N # C E R # W W R N # # # S # C
5T # S T O # K M K # O O E F # # I E # K
6R # R F I N E E S # T R V R # N # C S U
7U # E O T O T G T # I M R A E # # U T P
8S # V R A I F A A # E # E S N # S R A P
9I # R M C T I N T # R # S T C F L I E R
10O # E A I A L A I # # C R R R I E T R O
11N # S N T Z T M O # O # E U Y R V Y H G
12D C Y A N I E Y N N # # I C P E E P T R
13E I X G E L R C T # # # T T T W L O E A
14T M O E H I S I # # S # E U I A D L V M
15E O R R T T N L # # # U E R O L I I I S
16C N P # U U # O # # # # R E N L A C T #
17T O # # A # # P # # # # H I # # R Y C #
18I G # N # # S T A E R H T E V I S S A P
19O R C Y T I L I B A R E N L U V # # # #
20N E # # S T O R A G E # # # # # # # # #
Word X Y Direction
ACTIVETHREATS  1918n
AUTHENTICATION  517n
AUTHORIZATION  203w
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  157s
ERGONOMIC  220n
FIREWALL  169s
INFRASTRUCTURE  143s
INTRUSIONDETECTION  13s
MANAGEMENT  811n
MANAGER  49s
MONITORING  31e
PACKETFILTERS  72s
PASSIVETHREATS  2018w
PLATFORM  42s
POLICYMANAGEMENT  816n
PROXYSERVERS  316n
RAIDLEVELS  1717n
SECURITYPOLICY  184s
SERVER  139n
STORAGE  520e
THREETIER  1318n
TWOTIER  113s
UTILIZATION  616n
VIRUS  1518nw
VULNERABILITY  1619w
WORKLOAD  92e
WORKSTATION  93s
WORM  124s