proprietary firewall full tunnel network intrusion prevention system firewall hardware firewall network address translation software firewall host- based firewall network access control anomaly monitoring forward proxy open source firewall next generation firewall network intrusion detection system access control list honeypot behavioral monitoring load balancing unified threat management stateful packet filtering virtual private network signature- based monitoring honeynet stateless packet filtering DMZ heuristic monitoring proprietary firewall full tunnel network intrusion prevention system firewall hardware firewall network address translation software firewall host- based firewall network access control anomaly monitoring forward proxy open source firewall next generation firewall network intrusion detection system access control list honeypot behavioral monitoring load balancing unified threat management stateful packet filtering virtual private network signature- based monitoring honeynet stateless packet filtering DMZ heuristic monitoring
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
proprietary firewall
full tunnel
network intrusion prevention system
firewall
hardware firewall
network address translation
software firewall
host-based firewall
network access control
anomaly monitoring
forward proxy
open source firewall
next generation firewall
network intrusion detection system
access control list
honeypot
behavioral monitoring
load balancing
unified threat management
stateful packet filtering
virtual private network
signature-based monitoring
honeynet
stateless packet filtering
DMZ
heuristic monitoring