Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

N O V U L N E R A B I L I T Y C O S K G
W B A C K U P P R O G R A M S R B J V W
S E U V I R U S R E V R E S Y X O R P W
M T T S E C U R I T Y P O L I C Y A K P
O P H P I N F R A S T R U C T U R E N Y
N O O U R N V P A C K E T F I L T E R S
I L R L E S E A C T I V E T H R E A T S
T I I L G U Y S M R O F T A L P L X M K
O C Z A A Q T S S N O I T A Z I L I T U
R Y A W N C K I L C M X W O R K L O A D
I M T E A T F V V W O R K S T A T I O N
N A I R M G R E R G O N O M I C X N L T
G N O I R E I T E E R H T W O T I E R Q
I A N F T X T H O X D S U I J F V M G W
Y G L K O I I R Y I A W Z F N N D V Y D
P E N O I T C E T E D N O I S U R T N I
S M G N O I T A C I T N E H T U A M N C
K E N C R Y P T I O N H Y T F O B N J Q
L N R E V R E S T O R A G E O C W M C M
U T S L E V E L D I A R F G T R A G V E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # V U L N E R A B I L I T Y # # # # #
2# B A C K U P P R O G R A M S # # # # #
3# # U V I R U S R E V R E S Y X O R P #
4M # T S E C U R I T Y P O L I C Y # # #
5O P H # I N F R A S T R U C T U R E # #
6N O O # R N # P A C K E T F I L T E R S
7I L R L E # E A C T I V E T H R E A T S
8T I I L G # # S M R O F T A L P # # # #
9O C Z A A # # S S N O I T A Z I L I T U
10R Y A W N # # I # C M # W O R K L O A D
11I M T E A # # V # W O R K S T A T I O N
12N A I R M # # E R G O N O M I C # # # #
13G N O I R E I T E E R H T W O T I E R #
14# A N F # # # H # # # # # I # # # # # #
15# G # # # # # R # # # # # # N # # # # #
16# E N O I T C E T E D N O I S U R T N I
17# M # N O I T A C I T N E H T U A # # #
18# E N C R Y P T I O N # # # # # # N # #
19# N R E V R E S T O R A G E # # # # C #
20# T S L E V E L D I A R # # # # # # # E
Word X Y Direction
ACTIVETHREATS  87e
AUTHENTICATION  1717w
AUTHORIZATION  32s
BACKUPPROGRAMS  22e
BUSINESSCONTINUANCE  1111se
ENCRYPTION  218e
ERGONOMIC  812e
FIREWALL  414n
INFRASTRUCTURE  55e
INTRUSIONDETECTION  2016w
MANAGEMENT  211s
MANAGER  512n
MONITORING  14s
PACKETFILTERS  86e
PASSIVETHREATS  86s
PLATFORM  168w
POLICYMANAGEMENT  26s
PROXYSERVERS  193w
RAIDLEVELS  1220w
SECURITYPOLICY  44e
SERVER  819w
STORAGE  819e
THREETIER  1313w
TWOTIER  1313e
UTILIZATION  209w
VIRUS  43e
VULNERABILITY  31e
WORKLOAD  1310e
WORKSTATION  1111e
WORM  1413nw