Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

U A N P X A A C T I V E T H R E A T S B
N S F O A U T H E N T I C A T I O N I E
O I Z L I S R X M O N I T O R I N G C R
I S D I E T S E P L L A W E R I F N N G
T R V C R I C I I R D X O M S O A G S O
A E U Y U A N E V T O E R W J U G H L N
Z T L M T D O L T E O X M T N V I F E O
I L N A C W I E R E T W Y I C S S R V M
R I E N U X T G E U D H T S V M U E E I
O F R A R P P A V W W N R A E T R I L C
H T A G T G Y R R N O M O E O R I T D L
T E B E S W R O E C R R A I A K V E I Y
U K I M A G C T S A K O K N S T H E A C
A C L E R P N S P L L F T S A U S R R K
K A I N F W E N T Q O T T I T G R H K S
F P T T N N F X D C A A I D A A E T P B
A G Y F I M Z R W E D L D R U K T R N Z
S X Z S E C U R I T Y P O L I C Y I X I
T B U T I L I Z A T I O N C W U V R O C
V B A C K U P P R O G R A M S F T W D N
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # N P # # A C T I V E T H R E A T S #
2N # # O A U T H E N T I C A T I O N # E
3O # # L I S R # M O N I T O R I N G C R
4I S # I E T S E P L L A W E R I F N # G
5T R V C R # C I I R # # O # # # A # S O
6A E U Y U # N E V T O # R # # U # # L N
7Z T L M T # O # T E O X M # N # # # E O
8I L N A C # I E R E T W Y I # # S R V M
9R I E N U # T G E # D H T S # # U E E I
10O F R A R # P A V W W N R # E # R I L C
11H T A G T # Y R R # O M O E # R I T D #
12T E B E S # R O E C R R A I A # V E I #
13U K I M A # C T S # K O K N S T # E A #
14A C L E R # N S # # L F # S A U S R R #
15# A I N F # E # # # O T # # T G R H # S
16# P T T N N # # # # A A # # # A E T # #
17# # Y # I # # # # # D L # # # # T R N #
18# # # S E C U R I T Y P O L I C Y I # I
19# # U T I L I Z A T I O N # # # # # O #
20# B A C K U P P R O G R A M S # # # # N
Word X Y Direction
ACTIVETHREATS  71e
AUTHENTICATION  52e
AUTHORIZATION  114n
BACKUPPROGRAMS  220e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  715n
ERGONOMIC  202s
FIREWALL  174w
INFRASTRUCTURE  517n
INTRUSIONDETECTION  2018nw
MANAGEMENT  47s
MANAGER  1211se
MONITORING  93e
PACKETFILTERS  216n
PASSIVETHREATS  41se
PLATFORM  1218n
POLICYMANAGEMENT  42s
PROXYSERVERS  94se
RAIDLEVELS  1914n
SECURITYPOLICY  418e
SERVER  913n
STORAGE  814n
THREETIER  1816n
TWOTIER  139nw
UTILIZATION  319e
VIRUS  1712n
VULNERABILITY  35s
WORKLOAD  1110s
WORKSTATION  1111se
WORM  134s