Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

B P W L S R E V R E S Y X O R P H E I T
V S L E V E L D I A R S I S B N V B N E
U V Y S S N S C O D N S Z X O V S E C N
L S R E T L I F T E K C A P L T M N V C
N D R Y A S Q F T L K D Q M A E A W A R
E A H C E R G O N O M I C E G U U O Z Y
R S J I R O M L S U I F R A N E T R A P
A M E L H L W U I R E H N I R H H K K T
B A N O T U R I E G T A T U R M E L D I
I R O P E I A V A E M N T E G W N O O O
L G I Y V V R R V Y O C E W C X T A X N
I O T T I E O I C C U T O A S Q I D C Z
T R A I S T T I S R I R Z G B N C F V Y
Y P Z R S C L S T E M M R O F T A L P T
R P I U A O E S R G R E I T O W T R R V
P U L C P N A U T H O R I Z A T I O N F
O K I E I R T N O I T A T S K R O W S Q
K C T S F I R E W A L L N F I F N P Q I
Z A U N G N I R O T I N O M A N A G E R
W B I N T R U S I O N D E T E C T I O N
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # S R E V R E S Y X O R P # # # T
2V S L E V E L D I A R # # # # # # # N E
3U # # # S # # # # # # # # # # # S E C N
4L S R E T L I F T E K C A P # T M N # C
5N # # Y A # # # # # # # # # A E A W # R
6E # # C E R G O N O M I C E G U U O # Y
7R S # I R # # # S # # # R A N E T R # P
8A M # L H # # U # R E H N I R H H K # T
9B A N O T # R # E G T A T U R # E L # I
10I R O P E I # V A E M N T E # # N O # O
11L G I Y V # R R V Y O C E W # # T A # N
12I O T T I E O I C C U T O # # # I D # #
13T R A I S T T I S R I R # # # # C # # #
14Y P Z R S C L S T E M M R O F T A L P #
15# P I U A O E S R # R E I T O W T # # #
16# U L C P N A U T H O R I Z A T I O N #
17# K I E I R # N O I T A T S K R O W # #
18# C T S F I R E W A L L # # # # N # # #
19# A U N G N I R O T I N O M A N A G E R
20# B I N T R U S I O N D E T E C T I O N
Word X Y Direction
ACTIVETHREATS  515ne
AUTHENTICATION  175s
AUTHORIZATION  716e
BACKUPPROGRAMS  220n
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  202s
ERGONOMIC  56e
FIREWALL  518e
INFRASTRUCTURE  320ne
INTRUSIONDETECTION  320e
MANAGEMENT  1110ne
MANAGER  1419e
MONITORING  1419w
PACKETFILTERS  144w
PASSIVETHREATS  516n
PLATFORM  1914w
POLICYMANAGEMENT  615ne
PROXYSERVERS  161w
RAIDLEVELS  112w
SECURITYPOLICY  418n
SERVER  513ne
STORAGE  514ne
THREETIER  177sw
TWOTIER  1715w
UTILIZATION  319n
VIRUS  511ne
VULNERABILITY  12s
WORKLOAD  185s
WORKSTATION  1717w
WORM  1411sw