Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

K H S E R V E R A D V M W L S V T R W E
V S T B F L U G M I A Q Z T I N T X M E
D R A V Z L U L R A Z O A W E V F G C G
T E E J G A I U N I N E L M O K O N N W
J T R N P W S C X E R A E K L R A I O L
H L H E C E S Q I H R G G F R U M R I G
L I T G X R L L T M A A R E N O K O T S
A F E A L I Y E E N O E B I R S W T A R
U T V R R F V P A V I N T I T R R I Z E
T E I O U I J M T T E N O A L G E N I V
H K T T S T Y I E I O L T G M I I O L R
O C C S J C A E E C O I D J R U T M I E
R A A L I K R P S F O N V I U E O Y T S
I P T L N H D S C N U Q Y D A L W Z U Y
Z N O I T C E T E D N O I S U R T N I X
A P E Z E N G X E P L A T F O R M J E O
T H P N I N F R A S T R U C T U R E N R
I T Q S E C U R I T Y P O L I C Y T N P
O U U B A C K U P P R O G R A M S V M J
N B U U D N O I T A C I T N E H T U A W
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # S E R V E R # D V # # # S # T # # #
2# S T # # L U # M I A # # T # N # # # E
3# R A # # L # L R A # O A W E # # G C #
4# E E # # A # U N # N E L M O # # N N W
5# T R N # W S C # E R A E K # R A I O #
6# L H E C E S # I H R G G # R U M R I #
7# I T G # R # L T M A A R E N O K O T S
8A F E A # I Y E E N O E B I R S W T A R
9U T V R # F V P A V I N T I T # R I Z E
10T E I O # I # M T T E N O A L # E N I V
11H K T T S # Y # E I O L T G # I I O L R
12O C C S # C # E # C O I D # R # T M I E
13R A A # I # R # S # O N # I # E O Y T S
14I P # L # H # S # N # # # # A # W # U Y
15Z N O I T C E T E D N O I S U R T N I X
16A P # # # N # # # P L A T F O R M # # O
17T # # # I N F R A S T R U C T U R E # R
18I # # S E C U R I T Y P O L I C Y # # P
19O # U B A C K U P P R O G R A M S # # #
20N B # # # N O I T A C I T N E H T U A #
Word X Y Direction
ACTIVETHREATS  313n
AUTHENTICATION  1920w
AUTHORIZATION  18s
BACKUPPROGRAMS  419e
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  34se
ERGONOMIC  1613nw
FIREWALL  69n
INFRASTRUCTURE  517e
INTRUSIONDETECTION  1915w
MANAGEMENT  810ne
MANAGER  92se
MONITORING  1812n
PACKETFILTERS  214n
PASSIVETHREATS  214ne
PLATFORM  1016e
POLICYMANAGEMENT  315ne
PROXYSERVERS  2018n
RAIDLEVELS  1615nw
SECURITYPOLICY  418e
SERVER  31e
STORAGE  412n
THREETIER  515ne
TWOTIER  1715n
UTILIZATION  1914n
VIRUS  111sw
VULNERABILITY  61se
WORKLOAD  178nw
WORKSTATION  195sw
WORM  143se