unified threat management full tunnel virtual private network stateless packet filtering hardware firewall behavioral monitoring host- based firewall honeypot load balancing signature- based monitoring heuristic monitoring next generation firewall access control list software firewall network intrusion prevention system DMZ open source firewall honeynet proprietary firewall firewall network access control network intrusion detection system stateful packet filtering anomaly monitoring network address translation forward proxy unified threat management full tunnel virtual private network stateless packet filtering hardware firewall behavioral monitoring host- based firewall honeypot load balancing signature- based monitoring heuristic monitoring next generation firewall access control list software firewall network intrusion prevention system DMZ open source firewall honeynet proprietary firewall firewall network access control network intrusion detection system stateful packet filtering anomaly monitoring network address translation forward proxy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
unified threat management
full tunnel
virtual private network
stateless packet filtering
hardware firewall
behavioral monitoring
host-based firewall
honeypot
load balancing
signature-based monitoring
heuristic monitoring
next generation firewall
access control list
software firewall
network intrusion prevention system
DMZ
open source firewall
honeynet
proprietary firewall
firewall
network access control
network intrusion detection system
stateful packet filtering
anomaly monitoring
network address translation
forward proxy