hardware firewall proprietary firewall honeynet network intrusion detection system signature- based monitoring load balancing network address translation forward proxy full tunnel firewall anomaly monitoring stateful packet filtering stateless packet filtering unified threat management open source firewall network intrusion prevention system virtual private network behavioral monitoring access control list DMZ network access control honeypot host- based firewall software firewall next generation firewall heuristic monitoring hardware firewall proprietary firewall honeynet network intrusion detection system signature- based monitoring load balancing network address translation forward proxy full tunnel firewall anomaly monitoring stateful packet filtering stateless packet filtering unified threat management open source firewall network intrusion prevention system virtual private network behavioral monitoring access control list DMZ network access control honeypot host- based firewall software firewall next generation firewall heuristic monitoring
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
hardware firewall
proprietary firewall
honeynet
network intrusion detection system
signature-based monitoring
load balancing
network address translation
forward proxy
full tunnel
firewall
anomaly monitoring
stateful packet filtering
stateless packet filtering
unified threat management
open source firewall
network intrusion prevention system
virtual private network
behavioral monitoring
access control list
DMZ
network access control
honeypot
host-based firewall
software firewall
next generation firewall
heuristic monitoring