Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

R E G A N A M R O F T A L P V O F F Y F
N J N P A S S I V E T H R E A T S M I E
N S O O B U T I L I Z A T I O N R R C N
O T L L I V T H R E E T I E R O E N P C
J A Y I X T D H L M X Q G Y W W A O A R
Y E U C E W C J E D W N I O A U D R C Y
T R P Y K O B E L N I Y R L N G A Q K P
I H N M K T L T T R T K L I X S O B E T
L T O A K I Q G O E S I T E U W L J T I
I E I N P E U T L T D N C R V Q K A F O
B V T A I R I F A F O N I A J C R K I N
A I A G X N K T X C A V O M T X O S L Z
R T Z E O S I C S I N I E I Y I W E T Z
E C I M J O S S T O R A G E S W O N E X
N A R E N Y E R G O N O M I C U A N R B
L W O N R N S S L E V E L D I A R Z S O
U R H T I P R O X Y S E R V E R S T L C
V F T S E C U R I T Y P O L I C Y L N N
H H U X E V E R U T C U R T S A R F N I
Z B A C K U P P R O G R A M S E R V E R
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1R E G A N A M R O F T A L P # # # # # F
2# # N P A S S I V E T H R E A T S M I E
3# S # O # U T I L I Z A T I O N R R C N
4# T # L I # T H R E E T I E R O E N P C
5# A # I # T # H # # # # G # W W A # A R
6Y E # C # W C # E # # N # O A U D # C Y
7T R # Y # O # E # N I # R L N # A # K P
8I H N M # T # # T R T K L I # S O # E T
9L T O A # I # # O E S I T # U # L # T I
10I E I N # E # T # T D N C R # # K # F O
11B V T A # R I # A # O N I A # # R # I N
12A I A G # N # T # C # V O # T # O # L #
13R T Z E O # I # S # # # # I # I W # T #
14E C I M # O # S T O R A G E S # O # E #
15N A R E N # E R G O N O M I C U # N R #
16L # O N # N # S L E V E L D I A R # S #
17U # H T I P R O X Y S E R V E R S T # #
18V # T S E C U R I T Y P O L I C Y # N #
19# # U # # # E R U T C U R T S A R F N I
20# B A C K U P P R O G R A M S E R V E R
Word X Y Direction
ACTIVETHREATS  215n
AUTHENTICATION  52se
AUTHORIZATION  320n
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  202s
ERGONOMIC  715e
FIREWALL  201sw
INFRASTRUCTURE  2019w
INTRUSIONDETECTION  2019nw
MANAGEMENT  48s
MANAGER  71w
MONITORING  414ne
PACKETFILTERS  194s
PASSIVETHREATS  42e
PLATFORM  141w
POLICYMANAGEMENT  43s
PROXYSERVERS  617e
RAIDLEVELS  1716w
SECURITYPOLICY  418e
SERVER  1520e
STORAGE  814e
THREETIER  74e
TWOTIER  65s
UTILIZATION  63e
VIRUS  1212ne
VULNERABILITY  118n
WORKLOAD  1713n
WORKSTATION  146sw
WORM  155ne