Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

Z E N C R Y P T I O N T H R E E T I E R
M U Y S R E T L I F T E K C A P N E E E
P T E E W S F Y O N T E N E R T G I C H
N N F R O T M P T N R M L O R V T N N G
O E L V R O R A E I O Q X U S O A M O L
I M E E K R W M R N L Y S T W U R R I Z
T E A R L A E D I G S I A T N O D O T S
A G I M O G J T W E O E B I D T D F A T
T A J K A E O P R N R R T A M L S T Z A
S N B N D R M V D H H N P L R L N A I E
K A A L I F E E T X O F L P E E S L L R
R M Z N B R T E E C V A E V U X N P I H
O Y G F S E V R S G W Q E Y I K S L T T
W C D P C I G S I E Q L F N P R C S U E
O I Y T S O E K R W D P V H W W U A H V
R L I S N N L I G I R E G A N A M S B I
M O A O I N F R A S T R U C T U R E V T
N P M S E C U R I T Y P O L I C Y C M C
Z I U X W P C N O I T A Z I R O H T U A
C B S O P N O I T A C I T N E H T U A Y
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# E N C R Y P T I O N T H R E E T I E R
2# # # S R E T L I F T E K C A P N # E E
3# T # E W S # Y # # T # # # R T # I C #
4N N # R O T M # T N # M # O R # T N N #
5O E # V R O # A E I O # X U S O A M O #
6I M # E K R # M R N L Y S T W U # R I #
7T E # R L A E # I G S I A T N # # O T S
8A G # # O G # T # E O E B I # # # F A T
9T A # # A E O # R N R R T A # # S T Z A
10S N # N D R # V D H # N P L R L # A I E
11K A A # I # E E T # O # L P E E # L L R
12R M # N # R T E E C # A # V U # N P I H
13O Y G # S E V R S # W # E # I K # L T T
14W C # # C I G S # E # L # # # R C # U E
15O I # T S O E # R # D # # # # # U A # V
16R L I S N N # I # I R E G A N A M S B I
17M O A O I N F R A S T R U C T U R E # T
18N P M S E C U R I T Y P O L I C Y # # C
19# I U # # # # N O I T A Z I R O H T U A
20C B # # # N O I T A C I T N E H T U A #
Word X Y Direction
ACTIVETHREATS  2019n
AUTHENTICATION  1920w
AUTHORIZATION  2019w
BACKUPPROGRAMS  1916nw
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  21e
ERGONOMIC  912sw
FIREWALL  717ne
INFRASTRUCTURE  517e
INTRUSIONDETECTION  181sw
MANAGEMENT  212ne
MANAGER  1716w
MONITORING  124sw
PACKETFILTERS  162w
PASSIVETHREATS  218ne
PLATFORM  1812n
POLICYMANAGEMENT  217n
PROXYSERVERS  162sw
RAIDLEVELS  818ne
SECURITYPOLICY  418e
SERVER  42s
STORAGE  63s
THREETIER  121e
TWOTIER  147ne
UTILIZATION  1914n
VIRUS  1412se
VULNERABILITY  2015nw
WORKLOAD  53s
WORKSTATION  113n
WORM  114s