Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

M I X L J A Y T I L I B A R E N L U V U
M O N I T O R I N G B M A N A G E R O B
P S N T A O O N O I T A Z I R O H T U A
Z P R K R A I D L E V E L S E X C S T C
L A O E R U T C U R T S A R F N I R I K
A S U L T I S T O R A G E A Z N F E L U
C S E T I L C I M O N O G R E R I V I P
T I E R H C I E O S A O J S O E R R Z P
I V F C V E Y F I N A I S L W I E E A R
V E J C U E N M T W D C N L V T W S T O
E T S W F R R T A E O E C D B E A Y I G
T H H O O D I F I N K R T F A E L X O R
H R U R H R L T T C A C K E A R L O N A
R E S M D N K I Y W A G A S C H I R R M
E A B U G F N L O P O T E P T T K P M S
A T Z B R U C Z O O O T I M E A I C Y Y
T S J Z A I B P T A N L I O E H T O S P
S Z Z N F Z V O S B D B I E N N E I N N
A Q C B P L A T F O R M G C R K T K O Z
V E N C R Y P T I O N D R K Y A Y D E N
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# I # # # # Y T I L I B A R E N L U V #
2M O N I T O R I N G # M A N A G E R # B
3# S # T # # # N O I T A Z I R O H T U A
4# P R # R A I D L E V E L S # # # S T C
5# A O E R U T C U R T S A R F N I R I K
6A S U L T # S T O R A G E # # N F E L U
7C S E T I L C I M O N O G R E R I V I P
8T I E R H C I # O # # # # S # E R R Z P
9I V # C V E Y F # N # # S # # I E E A R
10V E # # U E N M T W D C # # # T W S T O
11E T # W # R R T A E O E # # # E A Y I G
12T H # O O # I # I N K R T # # E L X O R
13H R # R # R # T T C A C K E # R L O N A
14R E S M # # K I Y W A G A S C H # R # M
15E A # U # # N L # P O T E P T T # P # S
16A T # # R U # # O # O T I M # A I # # #
17T S # # A I # # # A # L I O E # T O # #
18S # # N # # V # # # D # I E N N # I N #
19# # C # P L A T F O R M # C R # T # O #
20# E N C R Y P T I O N # # # Y # # # # N
Word X Y Direction
ACTIVETHREATS  16s
AUTHENTICATION  25se
AUTHORIZATION  203w
BACKUPPROGRAMS  202s
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  220e
ERGONOMIC  157w
FIREWALL  176s
INFRASTRUCTURE  175w
INTRUSIONDETECTION  21se
MANAGEMENT  810se
MANAGER  122e
MONITORING  12e
PACKETFILTERS  1415nw
PASSIVETHREATS  24s
PLATFORM  519e
POLICYMANAGEMENT  15se
PROXYSERVERS  1815n
RAIDLEVELS  54e
SECURITYPOLICY  27se
SERVER  26se
STORAGE  76e
THREETIER  1615n
TWOTIER  913se
UTILIZATION  193s
VIRUS  718nw
VULNERABILITY  191w
WORKLOAD  411se
WORKSTATION  1111se
WORM  411s