Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

P P T W O T I E R W S L E V E L D I A R
A L N P R O X Y S E R V E R S Y X Q X E
C A E D V U L N E R A B I L I T Y B C L
K T M O N I T O R I N G S L I F Z N U S
E F E N O I T A C I T N E H T U A M E T
T O G N O I T P Y R C N E V J U T B L A
F R A U T H O R I Z A T I O N B L P K E
I M N O I T A T S K R O W I K U Z G R R
L B A K N P A S S I V E T H R E A T S H
T T M A N A G E R F B N J M X U R G C T
E L Y I I M H D O H O C I M O N O G R E
R A C D K O V X H C R L J O B S U R I V
S C I R E V R E S F I R E W A L L N B I
T H L P F P F S A B W R E I T E E R H T
O N O I T C E T E D N O I S U R T N I C
R A P C F N M R O W O R K L O A D Q J A
A F E G I N F R A S T R U C T U R E W Z
G V N S E C U R I T Y P O L I C Y B D W
E F U T I L I Z A T I O N O N Z Y J P J
A B A C K U P P R O G R A M S V O U O B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1P P T W O T I E R # S L E V E L D I A R
2A L N P R O X Y S E R V E R S # # # # E
3C A E # V U L N E R A B I L I T Y # C #
4K T M O N I T O R I N G # # # # # N # S
5E F E N O I T A C I T N E H T U A # # T
6T O G N O I T P Y R C N E # # U # # # A
7F R A U T H O R I Z A T I O N # # # # E
8I M N O I T A T S K R O W I # # # # # R
9L # A # # P A S S I V E T H R E A T S H
10T # M A N A G E R # # N # # # # # # # T
11E # Y # # # # # # # O C I M O N O G R E
12R # C # # # # # # C # # # # # S U R I V
13S # I R E V R E S F I R E W A L L # # I
14T # L # # # # S # # # R E I T E E R H T
15O N O I T C E T E D N O I S U R T N I C
16R # P # # N M R O W O R K L O A D # # A
17A # # # I N F R A S T R U C T U R E # #
18G # # S E C U R I T Y P O L I C Y # # #
19E # U T I L I Z A T I O N # # # # # # #
20# B A C K U P P R O G R A M S # # # # #
Word X Y Direction
ACTIVETHREATS  2016n
AUTHENTICATION  175w
AUTHORIZATION  37e
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  136w
ERGONOMIC  2011w
FIREWALL  1013e
INFRASTRUCTURE  517e
INTRUSIONDETECTION  1915w
MANAGEMENT  310n
MANAGER  310e
MONITORING  34e
PACKETFILTERS  11s
PASSIVETHREATS  69e
PLATFORM  21s
POLICYMANAGEMENT  315n
PROXYSERVERS  42e
RAIDLEVELS  201w
SECURITYPOLICY  418e
SERVER  913w
STORAGE  113s
THREETIER  2014w
TWOTIER  31e
UTILIZATION  319e
VIRUS  2012w
VULNERABILITY  53e
WORKLOAD  1016e
WORKSTATION  128w
WORM  1016w