Chapter 9 Network Management

ACTIVETHREATS
AUTHENTICATION
AUTHORIZATION
BACKUPPROGRAMS
BUSINESSCONTINUANCE
ENCRYPTION
ERGONOMIC
FIREWALL
INFRASTRUCTURE
INTRUSIONDETECTION
MANAGEMENT
MANAGER
MONITORING
PACKETFILTERS
PASSIVETHREATS
PLATFORM
POLICYMANAGEMENT
PROXYSERVERS
RAIDLEVELS
SECURITYPOLICY
SERVER
STORAGE
THREETIER
TWOTIER
UTILIZATION
VIRUS
VULNERABILITY
WORKLOAD
WORKSTATION
WORM

Network Management

Try to find all 30 words on this board.

Z Q V S R E T L I F T E K C A P R C I V
N E N M R O F T A L P M E S U Y E Q V W
F W C O V Y L S Q O S S N U B Y G C X F
S M O N I A T P T X W L C R U M A D U J
T X O R A T K I R A B O E I Y D N O F P
A N Q N K U C G L O E R R V R R A I X E
E O B N I S N E L I X R H K E Z M S L R
R I R Y C T T I T L B Y H K L L W D D U
H T E X I W O A T E A A S T E O D J B T
T A I E M O O R T N D W R E E Q A I E C
E Z T K O T B R I I O N E E R V D D A U
V I E E N I T H M N O C O R N V I M Y R
I L E T O E U A W R G N S I I L E T X T
S I R B G R W E G A R O T S S F U R C S
S T H L R N O I T P Y R C N E U D V S A
A U T H E N T I C A T I O N T N R O K R
P O L I C Y M A N A G E M E N T I T Q F
S J T Y Y C I L O P Y T I R U C E S N N
P P D N O I T A Z I R O H T U A F P U I
A R E V R E S M A R G O R P P U K C A B
Brought to you by WordSearchFun.com



Answer Key for Chapter 9 Network Management

X
Y
1234567891011121314151617181920
1# # # S R E T L I F T E K C A P R # # #
2# E N M R O F T A L P # # S # # E # # #
3# W C O # Y # S # # S # # U # # G # # #
4S M O N I # T P T # W L # R # # A # # #
5T # O R A T # I R A # O E I # # N # # #
6A N # N K U C # L O E # R V # # A # # E
7E O # # I S N E L I X R # K E # M # # R
8R I R # C T T I T L B Y H # L L # # # U
9H T E # I W O A T E A A S T # O D # # T
10T A I # M O O R T N D W R E E # A I # C
11E Z T # O T # R I I O N E E R V # D A U
12V I E # N I # # M N O C O R N V I # # R
13I L E # O E # # # # G N S I I L E T # T
14S I R # G R # E G A R O T S S F U R C S
15S T H # R N O I T P Y R C N E U # V S A
16A U T H E N T I C A T I O N # N R # # R
17P O L I C Y M A N A G E M E N T I T # F
18# # # # Y C I L O P Y T I R U C E S N N
19# # # N O I T A Z I R O H T U A # # U I
20# R E V R E S M A R G O R P P U K C A B
Word X Y Direction
ACTIVETHREATS  2015nw
AUTHENTICATION  116e
AUTHORIZATION  1619w
BACKUPPROGRAMS  2020w
BUSINESSCONTINUANCE  1111nw
ENCRYPTION  1515w
ERGONOMIC  516n
FIREWALL  1614nw
INFRASTRUCTURE  2019n
INTRUSIONDETECTION  2019nw
MANAGEMENT  717e
MANAGER  177n
MONITORING  24se
PACKETFILTERS  161w
PASSIVETHREATS  117n
PLATFORM  112w
POLICYMANAGEMENT  217e
PROXYSERVERS  84se
RAIDLEVELS  2012nw
SECURITYPOLICY  1818w
SERVER  720w
STORAGE  1414w
THREETIER  316n
TWOTIER  68s
UTILIZATION  216n
VIRUS  146n
VULNERABILITY  1815nw
WORKLOAD  114se
WORKSTATION  34se
WORM  69se