Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

C E M N L D H B S F I R E W A L L H G S
R B M F O N O I T A Z I R O H T U A J F
M A U P N I N F R A S T R U C T U R E D
O C T S O R T Z N O I T A T S K R O W I
N K I E I L E A C T I V E T H R E A T S
I U L C T N I G C R T I Y G K O W B Y M
T P I U C S E C A I M R O F T A L P S A
O P Z R E S R S Y N T T J C Z X V T E N
R R A I T R D E S M A N I R H L A W F T
I O T T E E A N V C A M E T E E K O R B
N G I Y D T V I S R O N R H R S Q T E N
G R O P N L S R D N E N A H T U O I I O
D A N O O I B F O L N S T G M U O E T I
A M P L I F G G Z R E E Y I E R A R E T
O S U I S T R Z L J V V W X N M O M E P
L E L C U E Z Q R I E N E K O U E W R Y
K R C Y R K F H S U R I V L S R A N H R
R V G H T C F S T O R A G E S T P N T C
O E E P N A A Y U T P W E E A B O Z C N
W R K Q I P V U L N E R A B I L I T Y E
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # N # # # # # F I R E W A L L # # #
2# B # # O N O I T A Z I R O H T U A # #
3M A U P N I N F R A S T R U C T U R E #
4O C T S O R T # N O I T A T S K R O W #
5N K I E I L E A C T I V E T H R E A T S
6I U L C T N I G C # # # # # # # # # # #
7T P I U C S E C A I M R O F T A L P S #
8O P Z R E S R S Y N T # # C # # # T # #
9R R A I T R # E S M A N I # # # A W # #
10I O T T E E A # V C A M E # # E # O R #
11N G I Y D T # I # R O N # H R # # T E N
12G R O P N L # # D N E N A H T # # I I O
13D A N O O I # # O L # S T G M U # E T I
14A M # L I F # G # # E E Y I E R A R E T
15O S # I S T R # # # V V # X N M O # E P
16L E # C U E # # # I # # E # O U E W R Y
17K R # Y R K # # S U R I V L # R A N H R
18R V # # T C # S T O R A G E S # P N T C
19O E # # N A A # # # # # # # # # # # C N
20W R # # I P V U L N E R A B I L I T Y E
Word X Y Direction
ACTIVETHREATS  85e
AUTHENTICATION  1714nw
AUTHORIZATION  182w
BACKUPPROGRAMS  22s
BUSINESSCONTINUANCE  1111se
ENCRYPTION  2020n
ERGONOMIC  616ne
FIREWALL  101e
INFRASTRUCTURE  63e
INTRUSIONDETECTION  520n
MANAGEMENT  109se
MANAGER  1210nw
MONITORING  13s
PACKETFILTERS  620n
PASSIVETHREATS  620ne
PLATFORM  187w
POLICYMANAGEMENT  54se
PROXYSERVERS  1718nw
RAIDLEVELS  69se
SECURITYPOLICY  44s
SERVER  215s
STORAGE  818e
THREETIER  1918n
TWOTIER  188s
UTILIZATION  33s
VIRUS  1317w
VULNERABILITY  720e
WORKLOAD  120n
WORKSTATION  184w
WORM  1816nw