Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

S F O P R O X Y S E R V E R S V S G Y G
Y Q M N T Z E C X N U K X L P L P V N E
L I E O S K G I P C E L A A E U I I C I
F G N I B W A L B R P Q C V H R R N M P
I Y M T O B R O G Y V K E F U O A T N Y
B Q R A R Q O P D P E L M S T U C N O T
E S O Z Z U T Y E T D C C I N Q T E I I
R M F I O P S T F I H U N I S W I M T L
U A T L F S K I A O Z O T I O O V E A I
T R A I I V L R O N M N P R H R E G C B
C G L T R T N U Q N O W K A E K T A I A
U O P U E O N C F C D S O G W L H N T R
R R D R W G C E S R T E A R V O R A N E
T P S E A T X S E A N N T T M A E M E N
S P N V L C E I T O A X T E X D A Y H L
A U X R L N T I E M U E T U C S T C T U
R K R E I O O R E I T E E R H T S I U V
F C Z S W N C I M O N O G R E T I L A W
N A U T H O R I Z A T I O N G Y C O A K
I B K L S T A E R H T E V I S S A P N F
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # P R O X Y S E R V E R S # S # # G
2# # # N # # E C # N # # # # P L # V N E
3# I # O # # G I # C # # # A E # I I C #
4# # N I # # A L # R # # C V # R R N # #
5# # M T # # R O # Y # K E # U O A T N Y
6# # R A R # O P # P E L # S T U C N O T
7E S O Z # U T Y # T D # # I N # T E I I
8R M F I # # S T F I # # N I # W I M T L
9U A T L F # # I A O # O T # O O V E A I
10T R A I I # L R O N M N # R # R E G C B
11C G L T R T # U # N O W K # E K T A I A
12U O P U E # # C # C D S O G # L H N T R
13R R # R W # # E S R T E A R # O R A N E
14T P S E A # # S E A # N T # M A E M E N
15S P # V L # E I T # A # # E # D A Y H L
16A U # R L N T I # M # # # # C # T C T U
17R K # E I O O R E I T E E R H T S I U V
18F C # S W N C I M O N O G R E # I L A #
19N A U T H O R I Z A T I O N # # # O # #
20I B # # S T A E R H T E V I S S A P N #
Word X Y Direction
ACTIVETHREATS  175s
AUTHENTICATION  1918n
AUTHORIZATION  219e
BACKUPPROGRAMS  220n
BUSINESSCONTINUANCE  1111ne
ENCRYPTION  101s
ERGONOMIC  1518w
FIREWALL  59s
INFRASTRUCTURE  120n
INTRUSIONDETECTION  23se
MANAGEMENT  1814n
MANAGER  1016ne
MONITORING  1110ne
PACKETFILTERS  152sw
PASSIVETHREATS  1820w
PLATFORM  312n
POLICYMANAGEMENT  1819n
PROXYSERVERS  41e
RAIDLEVELS  810ne
SECURITYPOLICY  814n
SERVER  418n
STORAGE  78n
THREETIER  1617w
TWOTIER  419ne
UTILIZATION  412n
VIRUS  182sw
VULNERABILITY  2017n
WORKLOAD  168s
WORKSTATION  159sw
WORM  1211se