unified threatmanagementfulltunnelvirtualprivatenetworkstatelesspacketfilteringhardwarefirewallbehavioralmonitoringhost-basedfirewallhoneypotloadbalancingsignature-basedmonitoringheuristicmonitoringnextgenerationfirewallaccesscontrollistsoftwarefirewallnetworkintrusionpreventionsystemDMZopensourcefirewallhoneynetproprietaryfirewallfirewallnetworkaccesscontrolnetworkintrusiondetectionsystemstatefulpacketfilteringanomalymonitoringnetworkaddresstranslationforwardproxyunified threatmanagementfulltunnelvirtualprivatenetworkstatelesspacketfilteringhardwarefirewallbehavioralmonitoringhost-basedfirewallhoneypotloadbalancingsignature-basedmonitoringheuristicmonitoringnextgenerationfirewallaccesscontrollistsoftwarefirewallnetworkintrusionpreventionsystemDMZopensourcefirewallhoneynetproprietaryfirewallfirewallnetworkaccesscontrolnetworkintrusiondetectionsystemstatefulpacketfilteringanomalymonitoringnetworkaddresstranslationforwardproxy

Network Security Mod 9 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. unified threat management
  2. full tunnel
  3. virtual private network
  4. stateless packet filtering
  5. hardware firewall
  6. behavioral monitoring
  7. host-based firewall
  8. honeypot
  9. load balancing
  10. signature-based monitoring
  11. heuristic monitoring
  12. next generation firewall
  13. access control list
  14. software firewall
  15. network intrusion prevention system
  16. DMZ
  17. open source firewall
  18. honeynet
  19. proprietary firewall
  20. firewall
  21. network access control
  22. network intrusion detection system
  23. stateful packet filtering
  24. anomaly monitoring
  25. network address translation
  26. forward proxy