Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

P W Z J S R E V R E S Y X O R P N N J Z
S T I S S V S M A R G O R P P U K C A B
X M N R K U K O C N R P W Y Q R I D U P
W P F E N L R N T O S T B D E M A S T P
J N R T O M F I I I M K W I O O I E H O
Y U A L I N I T V T R O T N L N P C O L
T E S I T O R O E C O O O K E P A U R I
I Q T F A I E R T E W G R S S M S R I C
L Q R T C T W I H T R O S J L O S I Z Y
I J U E I A A N R E W C G Z E Y I T A M
B N C K T Z L G E D O K F M V R V Y T A
A O T C N I L M A N R D E R E E E P I N
R I U A E L I J T O K M U O L I T O O A
E T R P H I S I S I S D M F D T H L N G
N P E E T T N E T S T A A T I E R I K E
L Y H F U U R R O U A K N A A E E C Q M
U R V I A V M U R R T N A L R R A Y W E
V C P N E V J Q A T I A G P H H T E I N
P N C R I M I N G N O H E I C T S A H T
J E P B K F B G E I N W R V X Y E T B P
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # S R E V R E S Y X O R P # # # #
2# # I S S # S M A R G O R P P U K C A B
3# # N R # U # O C N # # # # # R I D U #
4# # F E N # R N T O # # # # E M A S T P
5# # R T O # F I I I M # # I O O I E H O
6Y # A L I N I T V T R # T N L N P C O L
7T # S I T O R O E C O O O K E # A U R I
8I # T F A I E R T E W G R S S # S R I C
9L # R T C T W I H T R O S # L # S I Z Y
10I # U E I A A N R E W C # # E # I T A M
11B N C K T Z L G E D O # # M V R V Y T A
12A O T C N I L # A N R # # R E E E P I N
13R I U A E L # # T O K # # O L I T O O A
14E T R P H I # I S I S # M F D T H L N G
15N P E # T T N E T S T # A T I E R I # E
16L Y # # U U R # O U A # N A A E E C # M
17U R # # A V # # R R T # A L R R A Y # E
18V C # N E # # # A T I # G P # H T # # N
19# N C R # # # # G N O # E # # T S # # T
20# E # # # # # # E I N # R # # # # # # #
Word X Y Direction
ACTIVETHREATS  92s
AUTHENTICATION  517n
AUTHORIZATION  192s
BACKUPPROGRAMS  202w
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  220n
ERGONOMIC  1010ne
FIREWALL  75s
INFRASTRUCTURE  32s
INTRUSIONDETECTION  1020n
MANAGEMENT  2010s
MANAGER  1314s
MONITORING  82s
PACKETFILTERS  414n
PASSIVETHREATS  176s
PLATFORM  1418n
POLICYMANAGEMENT  205s
PROXYSERVERS  161w
RAIDLEVELS  1517n
SECURITYPOLICY  184s
SERVER  914sw
STORAGE  914s
THREETIER  1619n
TWOTIER  109ne
UTILIZATION  616n
VIRUS  96nw
VULNERABILITY  118n
WORKLOAD  1110ne
WORKSTATION  1111s
WORM  118n