DDoS PCI THREAT HUNTING PENTEST ATTACK SURFACE SIEM SOCIAL ENGINEERING WORM METADATA HEADERS EXPLOIT ROOTKIT BYOD BOTNET BRUTE FORCE ATTACK ON- PREM HONEYPOT ZOMBIE VULNERABILITY AI KEYLOGGER NOC AVAILABILITY DOMAIN MACHINE LEARNING ENCRYPTION EDR ANOMALY ZERO- DAY PATCH IOT THREAT INTELLIGENCE 2FA CONFIDENTIALITY SOC IOT FIREWALL WHITEHAT BREACH RED TEAM PHISH GRAYHAT EPP RANSOMWARE DMZ BLACKHAT UBA PASSWORD PUA/PUP SPOOFING SOAR VPN SPEARPHISH C2C BLUE TEAM PURPLE TEAM CLOUD- BASED APT INTEGRITY KILL CHAIN DDoS PCI THREAT HUNTING PENTEST ATTACK SURFACE SIEM SOCIAL ENGINEERING WORM METADATA HEADERS EXPLOIT ROOTKIT BYOD BOTNET BRUTE FORCE ATTACK ON- PREM HONEYPOT ZOMBIE VULNERABILITY AI KEYLOGGER NOC AVAILABILITY DOMAIN MACHINE LEARNING ENCRYPTION EDR ANOMALY ZERO- DAY PATCH IOT THREAT INTELLIGENCE 2FA CONFIDENTIALITY SOC IOT FIREWALL WHITEHAT BREACH RED TEAM PHISH GRAYHAT EPP RANSOMWARE DMZ BLACKHAT UBA PASSWORD PUA/PUP SPOOFING SOAR VPN SPEARPHISH C2C BLUE TEAM PURPLE TEAM CLOUD- BASED APT INTEGRITY KILL CHAIN
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DDoS
PCI
THREAT HUNTING
PENTEST
ATTACK SURFACE
SIEM
SOCIAL ENGINEERING
WORM
METADATA
HEADERS
EXPLOIT
ROOTKIT
BYOD
BOTNET
BRUTE FORCE ATTACK
ON-PREM
HONEYPOT
ZOMBIE
VULNERABILITY
AI
KEYLOGGER
NOC
AVAILABILITY
DOMAIN
MACHINE LEARNING
ENCRYPTION
EDR
ANOMALY
ZERO-DAY
PATCH
IOT
THREAT INTELLIGENCE
2FA
CONFIDENTIALITY
SOC
IOT
FIREWALL
WHITEHAT
BREACH
RED TEAM
PHISH
GRAYHAT
EPP
RANSOMWARE
DMZ
BLACKHAT
UBA
PASSWORD
PUA/PUP
SPOOFING
SOAR
VPN
SPEARPHISH
C2C
BLUE TEAM
PURPLE TEAM
CLOUD-BASED
APT
INTEGRITY
KILL CHAIN