load balancing unified threat management access control list honeynet anomaly monitoring proprietary firewall software firewall next generation firewall network intrusion prevention system behavioral monitoring stateless packet filtering network address translation firewall honeypot network access control DMZ host- based firewall signature- based monitoring virtual private network hardware firewall network intrusion detection system forward proxy full tunnel stateful packet filtering open source firewall heuristic monitoring load balancing unified threat management access control list honeynet anomaly monitoring proprietary firewall software firewall next generation firewall network intrusion prevention system behavioral monitoring stateless packet filtering network address translation firewall honeypot network access control DMZ host- based firewall signature- based monitoring virtual private network hardware firewall network intrusion detection system forward proxy full tunnel stateful packet filtering open source firewall heuristic monitoring
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
load balancing
unified threat management
access control list
honeynet
anomaly monitoring
proprietary firewall
software firewall
next generation firewall
network intrusion prevention system
behavioral monitoring
stateless packet filtering
network address translation
firewall
honeypot
network access control
DMZ
host-based firewall
signature-based monitoring
virtual private network
hardware firewall
network intrusion detection system
forward proxy
full tunnel
stateful packet filtering
open source firewall
heuristic monitoring