Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

M Q B V S R E V R E S Y X O R P B C D T
R R E V R E S M A R G O R P P U K C A B
W G Q T X U Y F N O I T A Z I L I T U R
E G A R O T S T A E R H T E V I S S A P
Q A J E R U T C U R T S A R F N I R S O
A U T H O R I Z A T I O N H V N R E D L
O C O S B N O I T P Y R C N E N N I Q I
Y C I L O P Y T I R U C E S P J K T T C
D A O L K R O W T I M S S I G K W E T Y
A G H C A Q N P M Z T C U D T B P E E M
R N O I T A T S K R O W O R M O N R E A
E M R O F T A L P N W I Z Z I C W H G N
G U J T I B Q S T A E R H T E V I T C A
A I N T R U S I O N D E T E C T I O N G
N D D R E U N M A A T C I M O N O G R E
A L I E W U H J G Y G N I R O T I N O M
M B L B A U T H E N T I C A T I O N H E
A B W N L R A I D L E V E L S X S N Q N
Q V C C L V U L N E R A B I L I T Y O T
T E S K Z S R E T L I F T E K C A P V O
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # # S R E V R E S Y X O R P # # # #
2# R E V R E S M A R G O R P P U K C A B
3# # # # # # # # N O I T A Z I L I T U #
4E G A R O T S T A E R H T E V I S S A P
5# # # E R U T C U R T S A R F N I R # O
6A U T H O R I Z A T I O N # # N # E # L
7# # # # # N O I T P Y R C N E # # I # I
8Y C I L O P Y T I R U C E S # # # T # C
9D A O L K R O W # # # S S I # # # E # Y
10# # # # # # # # # # # C U # T # # E # M
11R N O I T A T S K R O W O R M O # R # A
12E M R O F T A L P N # # # # I # W H # N
13G # # # I # # S T A E R H T E V I T C A
14A I N T R U S I O N D E T E C T I O N G
15N # # # E # N # # # # C I M O N O G R E
16A # # # W U # # # # G N I R O T I N O M
17M # # # A U T H E N T I C A T I O N # E
18# # # N L R A I D L E V E L S # # # # N
19# # C # L V U L N E R A B I L I T Y # T
20# E # # # S R E T L I F T E K C A P # #
Word X Y Direction
ACTIVETHREATS  2013w
AUTHENTICATION  517e
AUTHORIZATION  16e
BACKUPPROGRAMS  202w
BUSINESSCONTINUANCE  1111sw
ENCRYPTION  157w
ERGONOMIC  2015w
FIREWALL  512s
INFRASTRUCTURE  175w
INTRUSIONDETECTION  214e
MANAGEMENT  2010s
MANAGER  117n
MONITORING  2016w
PACKETFILTERS  1820w
PASSIVETHREATS  204w
PLATFORM  912w
POLICYMANAGEMENT  205s
PROXYSERVERS  161w
RAIDLEVELS  618e
SECURITYPOLICY  148w
SERVER  72w
STORAGE  74w
THREETIER  1813n
TWOTIER  1813nw
UTILIZATION  193w
VIRUS  1613nw
VULNERABILITY  619e
WORKLOAD  89w
WORKSTATION  1111w
WORM  1211e