This bingo card has a free space and 24 words: Signature Detection, Rule-based Anomaly Detection, Penetration Identification Approach, Primary Approach for Network-based Intrusion Detection, Inline Sensor, Passive Sensor, Sensor Placement, Intrusion Detection System (IDS) Operation, Typical Activities of an IDS, IDS Outputs, Limitations of Intrusion Detection Systems, Intrusion Prevention System (IPS), Reactive Security, Comparison of IDS and IPS, Market-available IDS Comparison, Snort, Suricata, Bro/Zeek, Security Onion, AlienVault OSSIM, Zeek, Cisco Firepower, Snort Rules and ModSecurity.
Network Security Mod 9 | Cyber Bingo | Cyber Bingo | Cyber Bingo | Cyber Bingo
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.