Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

T S B G L X G H D V C G X A H I P K A C
P E A C T I V E T H R E A T S C N A U T
A R C X U G I F N V R E I T E E R H T N
S E K N Q C R T O T S R R R N P E J H E
S S U W A W U W I H I G N A F R R Y O M
I R P T U U S O T Q C O Q I N O U C R E
V E P X T T N T C J M N E D O X T I I G
E T R V H I L I E P R O G L I Y C L Z A
T L O U E L L E T P O M A E T S U O A N
H I G L N I A R E N W I R V P E R P T A
R F R N T Z W M D W O C O E Y R T Y I M
E T A E I A E O N O R C T L R V S T O Y
A E M R C T R N O R K D S S C E A I N C
T K S A A I I I I K S R W S N R R R F I
S C G B T O F T S L T E Q N E S F U I L
M A I I I N D O U O A G M Z T N N C B O
E P G L O N Z R R A T A U C U M I E L P
H E R I N S S I T D I N R E V R E S T W
Z N O T O P W N N A O A X D Z S V Z U L
I Z S Y U E J G I O N M R O F T A L P B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # B # # # # # # # # # # # # # # # A #
2P E A C T I V E T H R E A T S # # # U T
3A # C # # # I # N # R E I T E E R H T N
4S # K N # # R T O # # R # R # P E # H E
5S S U # A # U W I # # G # A # R R Y O M
6I R P # U U S O T # # O # I N O U C R E
7V E P # T T N T C # M N E D O X T I I G
8E T R V H I L I E # R O G L I Y C L Z A
9T L O U E L L E T # O M A E T S U O A N
10H I G L N I A R E N W I R V P E R P T A
11R F R N T Z W M D W O C O E Y R T Y I M
12E T A E I A E O N O R C T L R V S T O Y
13A E M R C T R N O R K # S S C E A I N C
14T K S A A I I I I K S R # S N R R R # I
15S C # B T O F T S L T E # # E S F U # L
16# A # I I N # O U O A G # # # N N C # O
17# P # L O # # R R A T A # # # # I E # P
18# # # I N # # I T D I N R E V R E S # #
19# # # T # # # N N # O A # # # # # # U #
20# # # Y # # # G I # N M R O F T A L P B
Word X Y Direction
ACTIVETHREATS  32e
AUTHENTICATION  55s
AUTHORIZATION  191s
BACKUPPROGRAMS  31s
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  1515n
ERGONOMIC  123s
FIREWALL  715n
INFRASTRUCTURE  1717n
INTRUSIONDETECTION  920n
MANAGEMENT  2011n
MANAGER  1220n
MONITORING  811s
PACKETFILTERS  217n
PASSIVETHREATS  12s
PLATFORM  1920w
POLICYMANAGEMENT  2016n
PROXYSERVERS  164s
RAIDLEVELS  144s
SECURITYPOLICY  1818n
SERVER  1818w
STORAGE  1313n
THREETIER  193w
TWOTIER  84s
UTILIZATION  66s
VIRUS  72s
VULNERABILITY  48s
WORKLOAD  1011s
WORKSTATION  1111s
WORM  1110n