Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

C R N P P P A C K E T F I L T E R S D H
Y N P O L I C Y M A N A G E M E N T N E
T A O A I S E O Q X F I R E W A L L C A
I U W I S T H U E R G O N O M I C N C L
L T R Y T S C U M A N A G E R C A T L N
I H Y C E A I E V O T Z V E N U I E O N
B E V I P B T V T T N W K R N V Q G Q S
A N N L X S W S E E N I I I E E S A D N
R T O O U C O R K T D C T T A L K R A O
E I I P T H T E N R H N H O E H I O O I
N C T Y I C I V G O O R O V R Q T T L T
L A A T L G E R K C E W E I Y I X S K P
U T Z I I J R E S A X L O A S P N F R Y
V I I R Z I F S T O D I C R T U B G O R
I O R U A N E S K I N Q S F M S R G W C
R N O C T N W R A R E I T E E R H T Q N
U C H E I N F R A S T R U C T U R E N E
S W T S O W T Y A K M R O F T A L P T I
F Q U Y N K P R O X Y S E R V E R S I C
P B A C K U P P R O G R A M S E X B P M
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # N # # P A C K E T F I L T E R S # #
2Y N P O L I C Y M A N A G E M E N T # E
3T A O A I # # # # # F I R E W A L L C A
4I U # I S T # # E R G O N O M I C N C #
5L T # Y T S C # M A N A G E R # A T # #
6I H # C # A I E # O # # # # # U I E # #
7B E # I # # T V T # N # # # N V # G # #
8A N N L # # W S E E # I # I E # S A D N
9R T O O U # O R K T D # T T # L # R A O
10E I I P T # T E # R H N H O E # # O O I
11N C T Y I # I V # # O R O V R # # T L T
12L A A T L # E R # C E W E I # I # S K P
13U T Z I I # R E S A # L O A S # N # R Y
14V I I R Z # # S T # D # # R T U # G O R
15I O R U A # E S # I # # # # M S R # W C
16R N O C T N # # A R E I T E E R H T # N
17U # H E I N F R A S T R U C T U R E N E
18S # T S O # # # # # M R O F T A L P # I
19# # U # N # P R O X Y S E R V E R S # #
20# B A C K U P P R O G R A M S # # # # #
Word X Y Direction
ACTIVETHREATS  203sw
AUTHENTICATION  23s
AUTHORIZATION  320n
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  2017n
ERGONOMIC  94e
FIREWALL  113e
INFRASTRUCTURE  517e
INTRUSIONDETECTION  2018nw
MANAGEMENT  92e
MANAGER  95e
MONITORING  95se
PACKETFILTERS  61e
PASSIVETHREATS  32se
PLATFORM  1818w
POLICYMANAGEMENT  42e
PROXYSERVERS  719e
RAIDLEVELS  817ne
SECURITYPOLICY  418n
SERVER  814n
STORAGE  1812n
THREETIER  1816w
TWOTIER  77s
UTILIZATION  59s
VIRUS  114s
VULNERABILITY  114n
WORKLOAD  1915n
WORKSTATION  1111nw
WORM  1212se