IT Week Word Search

Edit Answers
XDRCEVKTLLHENYGRJWECGSGKFPJBOD JSZEOJRSHWAVQEQNVZSPYWAREJVHBC RKVKFYNETWORKDDOIUASLRXDHIBOKO NXLWMALWAREHNFFOJKNZQSNEOEDEXM SIMNIMDQRISCJFNNPHPZDELWDJXNGP SRUNVAVVIICTGHCUXVORIVOHRZTNSU OTTPSCPKQZSIHQSXYDOONPJBDHIDPT LXSWWAFROXTWRPBBYWBOXQBAUHKUOE IYQOMDYKIDASEDQSSEQZOAGYSJWEOR NEJBJDYGYHVDKQRSYRAOVHJIIFSRFK ENLVPRSCDKQPCEAEZAUJTOHYMXCCIW LPFILESERVERAPMRCWVCXPPCGIETNL IQJQWSVPSHSSHVEDLMXAHULZAMQFGK NVEYFSXGUTCBMMMDOONRHVEZNAYGYA KDQHEFODLVRBXJAAUSAVFFXMTXIVTM ZGFHAGETXVTOMRIPDNBPTCTFIRVQIR FIREWALLAFOPJWLIHABZSEBVVCFSRO QFYYTAAMIQJOGAJUTRLOGSCIIYNLUW JKJRTBOINDMJKHNMLOJMIARRRPHLCG INFORMATIONTECHNOLOGYBNTUIKVEK NZHJFERDOUTLOOKMMEHIOAEUSCQVSP SINIIIIJGVDEABKJBPKXATVAEVBTRP SUFGMRCDZMIHRHIWAONAHAZLYKDSEA TAJPTCETHERNETCABLEXHDKNTZIKBF BFWBAIECVJJGTMFLLVFVLPLEYDRHYM LWICDSXELROUTERCJLGLARTTXERTCA GCFEZTGVOQXOOFMJUTJPPBSWDFSVDX LRUMXVFLCCRQNEVNBYIETODOSLITWI NVDJBNNIDJTLEZEVQVBQOTQRVNHHPP UVZBOJQHENCRYPTIONUYPAQKQEKWLG
1.
Switch
2.
Plex
3.
LineLink
4.
InformationTechnology
5.
VirtualNetwork
6.
Phishing
7.
Cybersecurity
8.
MACAddress
9.
Router
10.
IPAddress
11.
Laptop
12.
EthernetCable
13.
FileServer
14.
Spoofing
15.
Password
16.
Encryption
17.
Malware
18.
Antivirus
19.
Spyware
20.
Trojan
21.
Worm
22.
Ransomware
23.
Hacker
24.
Computer
25.
Network
26.
Email
27.
Firewall
28.
Database
29.
Cloud
30.
Outlook