Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

S T A E R H T E V I T C A Y L N H H O X
Q E N C R Y P T I O N M P C O V O I I R
F D C W O R K L O A D L R I R E A M E I
E N V N R E I T E E R H T L A I D I N R
R O U T A G R J P E Q A X O V B T T S N
U I L N F U D G M Z Z K M P B O R P S A
T T N E B C N Z O I X R W Y W U A R R U
C A E M X A S I R N O H C T S S I O E T
U Z R E O D C O T F O M V I T U D X T H
R I A G Y N H K T N L M O R O R L Y L E
T L B A M T I A U C O N I U R I E S I N
S I I N U A L T S P D C H C A V V E F T
A T L A F P N H O E P P S E G P E R T I
R U I M D Z O A T R M R U S E G L V E C
F V T Y W Y T E G C I G O M E O S E K A
N J Y C Y N C Y M E V N R G Y N Q R C T
I Z B I F T W N F L R O G B R P I S A I
O F F L I S X L L A W E R I F A Z S P O
P Z W O R K S T A T I O N F W I M P U N
Q H N P A S S I V E T H R E A T S S R B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1S T A E R H T E V I T C A Y # N # # # #
2# E N C R Y P T I O N # # C O # # # # R
3# # C W O R K L O A D # # I # # # # E I
4E N V N R E I T E E R H T L # # # I N #
5R O U T A # R # # # # A # O # # T T # #
6U I L N # U # G # # Z # M P # O R P S A
7T T N E B # N # O I # R # Y W U A R R U
8C A E M # A # I R N O # # T S S I O E T
9U Z R E O # C O T F O # # I T U D X T H
10R I A G # N H K T N # M O R O R L Y L E
11T L B A M T I A U # O N I U R I E S I N
12S I I N U A L T # P D C # C A V V E F T
13A T L A # P N # O E P # S E G # E R T I
14R U I M # # # A T R # R # S E # L V E C
15F # T Y # # # E G # I # O M E # S E K A
16N # Y C # # C # # E # N R G # N # R C T
17I # # I # T # # # # R O G # R # I S A I
18# # # L I # # L L A W E R I F A # S P O
19# # W O R K S T A T I O N # # # M # U N
20# # N P A S S I V E T H R E A T S S # B
Word X Y Direction
ACTIVETHREATS  131w
AUTHENTICATION  206s
AUTHORIZATION  413ne
BACKUPPROGRAMS  57se
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  22e
ERGONOMIC  64se
FIREWALL  1518w
INFRASTRUCTURE  117n
INTRUSIONDETECTION  203sw
MANAGEMENT  414n
MANAGER  511se
MONITORING  48se
PACKETFILTERS  1918n
PASSIVETHREATS  420e
PLATFORM  613ne
POLICYMANAGEMENT  419n
PROXYSERVERS  186s
RAIDLEVELS  176s
SECURITYPOLICY  1414n
SERVER  1811s
STORAGE  158s
THREETIER  134w
TWOTIER  148ne
UTILIZATION  214n
VIRUS  1612n
VULNERABILITY  34s
WORKLOAD  43e
WORKSTATION  419e
WORM  1118ne