Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

O U N P A C K E T F I L T E R S F W U R
V H I O A U T H E N T I C A T I O N E E
A F V L I S P L A T F O R M F R Z G C R
C E I I F T S L S V O Z E R K I A N A G
T Z R C S L C I G O S N I S L N A R H O
I J U Y R L N E V D H I T C A U W Z M N
V S S M E A O Q T E H A O M N O O Y O O
E M C A V W I D S E T G W I R S R A N M
T A N N R E T R W I D H T M F M K O I I
H R O A E R P R O F U N R G V H L Y T C
R G I G S I Y N L G O C O E L D O B O A
E O T E Y F R A H C P G C I A R A B R M
A R A M X P C E S E R V E R S T D A I A
T P Z E O I N S T O R A G E B U S M N E
S P I N R N E S L E V E L D I A R X G C
K U L T P N P A E R E I T E E R H T L G
N K I T I N F R A S T R U C T U R E N V
V C T S E C U R I T Y P O L I C Y I U I
X A U T H O R I Z A T I O N Q T N H Z V
K B D Z T Y T I L I B A R E N L U V F K
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # N P A C K E T F I L T E R S # W # R
2# # # O A U T H E N T I C A T I O N E E
3A # V L I S P L A T F O R M # R # G C R
4C # I I # T S # # # # # E # K # A N # G
5T # R C S L C I # # # # I S # N A # # O
6I # U Y R L N E V # # # T # A U W # M N
7V S S M E A O # T E # A O M N O O # O O
8E M # A V W I # # E T # W I R # R # N M
9T A N N R E T # # I D H T M # # K # I I
10H R O A E R P # O # # N R # # # L # T C
11R G I G S I Y N # # O # O E # # O # O #
12E O T E Y F R # # C # # # I A # A # R #
13A R A M X # C # S E R V E R S T D # I #
14T P Z E O # N S T O R A G E # U S # N #
15S P I N R # E S L E V E L D I A R # G #
16# U L T P N # # # R E I T E E R H T # #
17# K I # I N F R A S T R U C T U R E N #
18# C T S E C U R I T Y P O L I C Y # # I
19# A U T H O R I Z A T I O N # # # # # #
20# B # # # Y T I L I B A R E N L U V # #
Word X Y Direction
ACTIVETHREATS  13s
AUTHENTICATION  52e
AUTHORIZATION  219e
BACKUPPROGRAMS  220n
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  715n
ERGONOMIC  202s
FIREWALL  612n
INFRASTRUCTURE  517e
INTRUSIONDETECTION  2018nw
MANAGEMENT  47s
MANAGER  147ne
MONITORING  196s
PACKETFILTERS  41e
PASSIVETHREATS  41se
PLATFORM  73e
POLICYMANAGEMENT  42s
PROXYSERVERS  516n
RAIDLEVELS  1715w
SECURITYPOLICY  418e
SERVER  913e
STORAGE  814e
THREETIER  1816w
TWOTIER  139n
UTILIZATION  319n
VIRUS  33s
VULNERABILITY  1820w
WORKLOAD  176s
WORKSTATION  172sw
WORM  176sw