Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

V U L N E R A B I L I T Y R W E J L J H
I B A C K U P P R O G R A M S I U V V N
N O U T I L I Z A T I O N N E P T Y O X
T L T S M O N I T O R I N G Y P T I E A
R V H W I F V D K R R J A C N N T G G A
U S O T R N D F E Q I R I O E A T S R F
S T R H X D E I R B O L I M T R S D D R
I A I R T J T S R T O T E S E C L J A D
O E Z E O O L L S P A G K G E L E L O Y
N R A E W G O E Y C A R A U A X V M L P
D H T T S T R T I N O N W W M I E T K N
E T I I T V I T A W A N E G R X L M R O
T E O E E R N M O M B R T U R Q D U O I
E V N R U E Y R Q K I Z S I K W I V W T
C I P C H C M R O F T A L P N M A A J P
T S E T I N F R A S T R U C T U R E I Y
I S U L S T A E R H T E V I T C A X E R
O A O A P S R E V R E S Y X O R P N G C
N P A C K E T F I L T E R S B C S K C N
U J X O H F X T J E T C I M O N O G R E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1V U L N E R A B I L I T Y # # # # # # #
2I B A C K U P P R O G R A M S # # # # N
3N # U T I L I Z A T I O N # E # # # O #
4T # T S M O N I T O R I N G Y # T I # #
5R # H # I # # # # R # # A C N N T # # #
6U S O T # N # # E # # R I O E A # # # #
7S T R H # # E I # # O L I M T R S # D #
8I A I R # # T S # T O T E S E # L # A #
9O E Z E # O # # S P A G K G # L E # O #
10N R A E W # # E Y C A R A # A # V # L #
11D H T T # # R T I N O N # W # I E # K N
12E T I I # V I T A W A N E # R # L # R O
13T E O E E R N M O M # R T U # # D # O I
14E V N R U E Y R # # I # S I # # I # W T
15C I # C H C M R O F T A L P N # A # # P
16T S E T I N F R A S T R U C T U R E # Y
17I S U L S T A E R H T E V I T C A # # R
18O A O # # S R E V R E S Y X O R P N # C
19N P A C K E T F I L T E R S # # # # C N
20# # # # # # # # # # # C I M O N O G R E
Word X Y Direction
ACTIVETHREATS  1717w
AUTHENTICATION  218ne
AUTHORIZATION  32s
BACKUPPROGRAMS  22e
BUSINESSCONTINUANCE  1111se
ENCRYPTION  2020n
ERGONOMIC  2020w
FIREWALL  1015ne
INFRASTRUCTURE  516e
INTRUSIONDETECTION  12s
MANAGEMENT  813ne
MANAGER  1013ne
MONITORING  54e
PACKETFILTERS  219e
PASSIVETHREATS  219n
PLATFORM  1415w
POLICYMANAGEMENT  118ne
PROXYSERVERS  1718w
RAIDLEVELS  1716n
SECURITYPOLICY  217ne
SERVER  99sw
STORAGE  99ne
THREETIER  46s
TWOTIER  411ne
UTILIZATION  33e
VIRUS  1710sw
VULNERABILITY  11e
WORKLOAD  1914n
WORKSTATION  1111ne
WORM  1012sw