Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

I C V T N E M E G A N A M Y C I L O P G
P S M A R G O R P P U K C A B Z O T Q E
C F A P N M B A R L D X N U V Z Z K C T
P P N P E O U I O A A J O T I D T N J H
A A A Y R N D D X T O M I H M H A A A R
C S G C U I N L Y F L B T O O U U C V E
K S E I T T O E S O K L C R N Z T T U E
E I R L C O I V E R R D E I O O H I L T
T V N O U R T E R M O P T Z O K E V N I
F E O P R I P L V X W N E A W D N E E E
I T I Y T N Y S E O O L D T I R T T R R
L H T T S G R V R C R L N I F D I H A G
T R A I A H C M S E K A O O G M C R B O
E E Z R R E N S I G S W I N B S A E I N
R A I U F Q E T D S T E S L L U T A L O
S T L C N N O Z I B A R U E Q R I T I M
Y S I E I W S R K Q T I R E R I O S T I
L H T S T O R A G E I F T O L V N P Y C
B U U X H A O B V L O A N D U T E U H V
K B Y A R J Y T J R N H I S V Q H R U S
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # T N E M E G A N A M Y C I L O P #
2# S M A R G O R P P U K C A B # # # # E
3# # A # # M # A R L D # N U # # # # C T
4P P N # E O # I O A A # O T # # # N # H
5A A A Y R N # D X T O # I H # # A A # R
6C S G C U I N L Y F L # T O # U U C V E
7K S E I T T O E S O K # C R N # T T U E
8E I R L C O I V E R R # E I # # H I L T
9T V N O U R T E R M O # T Z # # E V N I
10F E O P R I P L V # W N E A # # N E E E
11I T I Y T N Y S E O O L D T # # T T R R
12L H T T S G R # R C R L N I # # I H A G
13T R A I A # C M S E K A O O # # C R B O
14E E Z R R # N S I # S W I N # S A E I N
15R A I U F # E T # # T E S # # U T A L O
16S T L C N N O # # # A R U E # R I T I M
17# S I E I W # # # # T I R # R I O S T I
18# # T S T O R A G E I F T # # V N # Y C
19# # U # # # # # # # O # N # # # E # # #
20# B # # # # # # # # N # I # # # # R # #
Word X Y Direction
ACTIVETHREATS  185s
AUTHENTICATION  175s
AUTHORIZATION  142s
BACKUPPROGRAMS  152w
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  715n
ERGONOMIC  2010s
FIREWALL  1218n
INFRASTRUCTURE  517n
INTRUSIONDETECTION  1320n
MANAGEMENT  131w
MANAGER  32s
MONITORING  63s
PACKETFILTERS  14s
PASSIVETHREATS  24s
PLATFORM  102s
POLICYMANAGEMENT  181w
PROXYSERVERS  92s
RAIDLEVELS  82s
SECURITYPOLICY  418n
SERVER  1315se
STORAGE  418e
THREETIER  203s
TWOTIER  518ne
UTILIZATION  319n
VIRUS  1618n
VULNERABILITY  196s
WORKLOAD  1110n
WORKSTATION  1111s
WORM  1110sw