Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

R E V R E S T A E R H T E V I S S A P U
P E X S U R I V U L N E R A B I L I T Y
T H C M O N I T O R I N G E K O C D A L
J U R N P W M E R G O N O M I C O U U B
I O U C A U T H E N T I C A T I O N J X
R I N T R U S I O N D E T E C T I O N Z
L I B C P J N P R O X Y S E R V E R S S
N C R H B Y M I R A I D L E V E L S U M
O E G A R O T S T A E R H T E V I T C A
I P O L I C Y M A N A G E M E N T H L R
T N O I T A T S K R O W O R M A W R V G
A R T M R O F T A L P C A N T V O E U O
Z I Z J F I R E W A L L S N O L T E R R
I C L S J R E G A N A M J S Y V I T Q P
L P A C K E T F I L T E R S E D E I Y P
I M Y L N S A D A O L K R O W N R E Y U
T W F E R U T C U R T S A R F N I R B K
U X C D Y C I L O P Y T I R U C E S E C
G C L W Y Y X N O I T A Z I R O H T U A
V D T O C P M E N C R Y P T I O N J L B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1R E V R E S T A E R H T E V I S S A P #
2# E # S U R I V U L N E R A B I L I T Y
3# # C M O N I T O R I N G # # # # # # #
4# # # N # # # E R G O N O M I C # # # #
5# # # # A U T H E N T I C A T I O N # #
6# I N T R U S I O N D E T E C T I O N #
7# # # # # # N P R O X Y S E R V E R S S
8N # # # # # # I R A I D L E V E L S # M
9O E G A R O T S T A E R H T E V I T C A
10I P O L I C Y M A N A G E M E N T H # R
11T N O I T A T S K R O W O R M # W R # G
12A # # M R O F T A L P C # # # # O E # O
13Z # # # F I R E W A L L S # # # T E # R
14I # # # # R E G A N A M # S # # I T # P
15L P A C K E T F I L T E R S E # E I # P
16I # # # # # # D A O L K R O W N R E # U
17T # # E R U T C U R T S A R F N I R # K
18U # # # Y C I L O P Y T I R U C E S # C
19# # # # # # # N O I T A Z I R O H T U A
20# # # # # # # E N C R Y P T I O N # # B
Word X Y Direction
ACTIVETHREATS  209w
AUTHENTICATION  55e
AUTHORIZATION  2019w
BACKUPPROGRAMS  2020n
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  820e
ERGONOMIC  84e
FIREWALL  513e
INFRASTRUCTURE  1717w
INTRUSIONDETECTION  26e
MANAGEMENT  810e
MANAGER  1214w
MONITORING  43e
PACKETFILTERS  215e
PASSIVETHREATS  191w
PLATFORM  1112w
POLICYMANAGEMENT  110e
PROXYSERVERS  87e
RAIDLEVELS  98e
SECURITYPOLICY  1818w
SERVER  61w
STORAGE  89w
THREETIER  189s
TWOTIER  1710s
UTILIZATION  118n
VIRUS  82w
VULNERABILITY  82e
WORKLOAD  1516w
WORKSTATION  1111w
WORM  1211e