Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

O S V M L V U L N E R A B I L I T Y N U
M N D B Y M S M A R G O R P P U K C A B
W O R K S T A T I O N U U S R K N P U F
S I L L A W E R I F M V T Q P B O S T A
R T W O T I E R J F C A W I G L I E H P
E A C T I V E T H R E A T S I N T C O E
T C U U S S G E C R W N W C E K C U R A
L I I Y H U Y G H X Z F Y S R Y E R I D
I T G N I R O T I N O M S T G H T I Z S
F N S Y V I E C W D A C E O O M E T A R
T E Q X M V W M A N O M R R N T D Y T E
E H G G I V R O A N D K V A O W N P I V
K T J S Y O L G T E O I E G M O O O O R
C U S D F K E I T T Q M R E I R I L N E
A A Z T R M N R E G A N A M C M S I U S
P S A O E U T I L I Z A T I O N U C M Y
U L W N A S W S L E V E L D I A R Y F X
P R T N K U D O R E I T E E R H T H O O
J A C A N O I T P Y R C N E U D N A E R
P E N E R U T C U R T S A R F N I N J P
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # # V U L N E R A B I L I T Y # #
2# N # # # # S M A R G O R P P U K C A B
3W O R K S T A T I O N # # S # # N P U #
4S I L L A W E R I F # # T # # # O S T #
5R T W O T I E R # # # A # # # L I E H #
6E A C T I V E T H R E A T S I N T C O #
7T C # # # S # # # R # # # C E # C U R #
8L I # # # U # # H # # # Y S R # E R I #
9I T G N I R O T I N O M S T G # T I Z S
10F N # # # I E # # D A C E O O # E T A R
11T E # # # V # M A N O # R R N # D Y T E
12E H # # I # R O A N # # V A O W N P I V
13K T # S # O L G T # # # E G M O O O O R
14C U S # F K E I # # # # R E I R I L N E
15A A # T R M N R E G A N A M C M S I # S
16P # A O E U T I L I Z A T I O N U C # Y
17# L W N A # # S L E V E L D I A R Y # X
18P # T N # # # # R E I T E E R H T # # O
19# # C # N O I T P Y R C N E # # N # # R
20# E # E R U T C U R T S A R F N I # # P
Word X Y Direction
ACTIVETHREATS  26e
AUTHENTICATION  215n
AUTHORIZATION  192s
BACKUPPROGRAMS  202w
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  1419w
ERGONOMIC  157s
FIREWALL  104w
INFRASTRUCTURE  1720w
INTRUSIONDETECTION  1720n
MANAGEMENT  129sw
MANAGER  1415w
MONITORING  129w
PACKETFILTERS  116n
PASSIVETHREATS  116ne
PLATFORM  118ne
POLICYMANAGEMENT  174sw
PROXYSERVERS  2020n
RAIDLEVELS  1717w
SECURITYPOLICY  184s
SERVER  139s
STORAGE  148s
THREETIER  1718w
TWOTIER  25e
UTILIZATION  616e
VIRUS  611n
VULNERABILITY  61e
WORKLOAD  317ne
WORKSTATION  23e
WORM  1612s