Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

C G F G N I R O T I N O M A N A G E R L
R E V U L N E R A B I L I T Y E S L F U
G S C T V P V A C T I V E T H R E A T S
S R E N N N O I T A Z I L I T U V A B C
T E K S A E E R E I T E E R H T W Z D E
A V L Y L U M M L S F S N C P C O W A U
E R D T Y E N E K L Y U I W J U R Y O S
R E V W R U V I G C A M N O O R K Z L M
H S T O R A G E T A O W O R M T S V K A
T Y F T H V B Q L N N E E B V S T V R R
E X D I Z G F M O D O A R R W A A V O G
V O P E I W W G L S I C M G I R T J W O
I R V R U H R L F L Y A S Y P F I P A R
S P A C K E T F I L T E R S C N O H J P
S G Y H Y N O I T P Y R C N E I N C P P
A U T H E N T I C A T I O N I N L L G U
P I N T R U S I O N D E T E C T I O N K
G A B X Y C I L O P Y T I R U C E S P C
V I R U S X A N O I T A Z I R O H T U A
P M R O F T A L P K W Q W V Q Z A E N B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # G N I R O T I N O M A N A G E R #
2# E V U L N E R A B I L I T Y E # # # #
3# S C T # # # A C T I V E T H R E A T S
4S R # N N N O I T A Z I L I T U # # # #
5T E # S A E # R E I T E E R H T W # D #
6A V # # L U M # L # # # # C # C O # A #
7E R # T # E N E # L # # I # # U R # O S
8R E # W # # V I G # A M # # # R K # L M
9H S T O R A G E T A O W O R M T S # K A
10T Y # T # # # # L N N # E # # S T # R R
11E X # I # # # # O D O A # R # A A # O G
12V O # E # # # G # # I C M # I R T # W O
13I R # R # # R # # # # A S Y # F I # # R
14S P A C K E T F I L T E R S C N O # # P
15S # # # # N O I T P Y R C N E I N # # P
16A U T H E N T I C A T I O N # N L # # U
17P I N T R U S I O N D E T E C T I O N K
18# # # # Y C I L O P Y T I R U C E S P C
19V I R U S # # N O I T A Z I R O H T U A
20# M R O F T A L P # # # # # # # # # # B
Word X Y Direction
ACTIVETHREATS  83e
AUTHENTICATION  116e
AUTHORIZATION  2019w
BACKUPPROGRAMS  2020n
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  1515w
ERGONOMIC  614ne
FIREWALL  1613nw
INFRASTRUCTURE  1615n
INTRUSIONDETECTION  217e
MANAGEMENT  1312nw
MANAGER  131e
MONITORING  131w
PACKETFILTERS  214e
PASSIVETHREATS  117n
PLATFORM  920w
POLICYMANAGEMENT  1817nw
PROXYSERVERS  214n
RAIDLEVELS  1314nw
SECURITYPOLICY  1818w
SERVER  29n
STORAGE  29e
THREETIER  165w
TWOTIER  47s
UTILIZATION  164w
VIRUS  119e
VULNERABILITY  32e
WORKLOAD  1912n
WORKSTATION  176s
WORM  129e