Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

J Z R E G A N A M C D A O L K R O W O G
I B A C K U P P R O G R A M S G Y D M N
N Q U T I L I Z A T I O N V S Y E F O Y
T J T S T O R A G E A J N R Y P T I T Z
R K H P I D C L I R I I E C N N T I H L
U S O K L N B V E A O V I O E A L K R D
S T R M L J E I L K R L I M T I S L E P
I A I R Z W T S M E O T E S B D L R E U
O E Z O M O I M S P A G K A W Y E Q T T
N R A F W W T Y Y C A R R H Y C V N I N
D H T T J B X T I N O E Y Z L O E W E N
E T I A G O I T A W N N H A L N L E R O
T E O L R R N M O L Z C T Z T C D T C I
E V N P U E Y R U Z N Q U I B U I W N T
C I E C H C M V I R U S E R N Z A G D P
T S E T I N F R A S T R U C T U R E J Y
I S U L S T A E R H T E V I T C A S N R
O A O F I R E W A L L A M I Z O G N S C
N P A C K E T F I L T E R S H E B I C N
K G N I R O T I N O M C I M O N O G R E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # R E G A N A M # D A O L K R O W # #
2I B A C K U P P R O G R A M S # # # # N
3N # U T I L I Z A T I O N # S # # # O Y
4T # T S T O R A G E # # # R Y # T I T #
5R # H # I # # # # R # # E C N N T I H #
6U S O # # N # # E # # V I O E A L # R #
7S T R M # # E I # # R L I M T I S # E #
8I A I R # # T S # E O T E S B # L # E #
9O E Z O # O # # S P A G K A # # E # T #
10N R A F W # # Y Y C A R R # # # V # I #
11D H T T # # X T I N O E # # # # E # E N
12E T I A # O I T A W N N # # # # L # R O
13T E O L R R N M O L # # T # # # D # # I
14E V N P U E Y R U # # # # I # # I # # T
15C I # C H C M V I R U S # # N # A # # P
16T S E T I N F R A S T R U C T U R E # Y
17I S U L S T A E R H T E V I T C A # # R
18O A O F I R E W A L L # # # # # # N # C
19N P A C K E T F I L T E R S # # # # C N
20# G N I R O T I N O M C I M O N O G R E
Word X Y Direction
ACTIVETHREATS  1717w
AUTHENTICATION  218ne
AUTHORIZATION  32s
BACKUPPROGRAMS  22e
BUSINESSCONTINUANCE  1111se
ENCRYPTION  2020n
ERGONOMIC  2020w
FIREWALL  418e
INFRASTRUCTURE  516e
INTRUSIONDETECTION  12s
MANAGEMENT  813ne
MANAGER  91w
MONITORING  1120w
PACKETFILTERS  219e
PASSIVETHREATS  219n
PLATFORM  414n
POLICYMANAGEMENT  118ne
PROXYSERVERS  414ne
RAIDLEVELS  1716n
SECURITYPOLICY  217ne
SERVER  99ne
STORAGE  44e
THREETIER  194s
TWOTIER  411ne
UTILIZATION  33e
VIRUS  815e
VULNERABILITY  815ne
WORKLOAD  181w
WORKSTATION  1111ne
WORM  1012sw