Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

R E V R E S T A E R H T E V I S S A P T
Z I N T R U S I O N D E T E C T I O N B
V P W O R K L O A D S D Q I G S L S U A
F K N M Q P L L A W E R I F Q I T S M C
X W O R K S T A T I O N U S C O I E N K
V O I W S F N P V X K X R Y R N N C O U
U R T G N I R O T I N O M A E X F U I P
L M A D X H S A I I L A G S J S R R T P
N D C C N J U G R T N E S C R H A I A R
E H I U T P R E C A A C L E I I S T Z O
R N T M T I I L G I O Z T U D V T Y I G
A O N K A T V E P N M L I L V H R P R R
B I E N O N M E T L I O E L R P U O O A
I T H W O E A I T F A V N E I K C L H M
L P T Q N Q N G T H E T E O R T T I T S
I Y U T Y U Z E E L R T F N G Z U C U F
T R A O A H K K S R I E V O W R R Y A A
Y C A N V C C L U E J F A C R E E U Q U
H N C M A G L P R P B R J T P M R U X K
X E Q P R O X Y S E R V E R S S B H V M
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1R E V R E S T A E R H T E V I S S A P #
2# I N T R U S I O N D E T E C T I O N B
3# # W O R K L O A D # # # # # # L S U A
4# # N # # # L L A W E R I F # I T S # C
5# W O R K S T A T I O N # # C O I E N K
6V O I # # # N # # # # # # Y R N N C O U
7U R T G N I R O T I N O M A E # F U I P
8L M A # # # S # I # # A G S # S R R T P
9N # C C # # U # R T N E S # R # A I A R
10E # I # T # R E C A A C # E # I S T Z O
11R N T M # I I # G I O Z T # D # T Y I G
12A O N # A T V E P N M L I L # H R P R R
13B I E # O N M E T L I O E L R # U O O A
14I T H W # E A I T F A V N E I # C L H M
15L P T # N # N G T H E T E O # T T I T S
16I Y U T # U # E E L R T F # G # U C U #
17T R A # A # K # S R I E # O # R R Y A #
18Y C # N # C # # # E # # A # R # E # # #
19# N C # A # # # R # # # # T # M # # # #
20# E # P R O X Y S E R V E R S # # # # #
Word X Y Direction
ACTIVETHREATS  38se
AUTHENTICATION  317n
AUTHORIZATION  1917n
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  220n
ERGONOMIC  1718nw
FIREWALL  144w
INFRASTRUCTURE  175s
INTRUSIONDETECTION  22e
MANAGEMENT  137sw
MANAGER  411se
MONITORING  137w
PACKETFILTERS  420ne
PASSIVETHREATS  191w
PLATFORM  912se
POLICYMANAGEMENT  182sw
PROXYSERVERS  420e
RAIDLEVELS  188sw
SECURITYPOLICY  184s
SERVER  61w
STORAGE  183sw
THREETIER  1711sw
TWOTIER  315ne
UTILIZATION  1716nw
VIRUS  712n
VULNERABILITY  16s
WORKLOAD  33e
WORKSTATION  35e
WORM  25s