HardwareInventoryIncidentResponseLimitPorts &ProtocolsSoftwareInventoryBoundaryDefenseSecureNetworkMalwareDefenseBusinessContinuityTheAlamoAccountMonitoringbingobakerSecurityAwarenessSecureAdminDataProtectionSecureConfigDataRecoveryVulner-abilityMGMTHardwareInventoryIncidentResponseLimitPorts &ProtocolsSoftwareInventoryBoundaryDefenseSecureNetworkMalwareDefenseBusinessContinuityTheAlamoAccountMonitoringbingobakerSecurityAwarenessSecureAdminDataProtectionSecureConfigDataRecoveryVulner-abilityMGMT

Practical IT Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
  1. Hardware Inventory
  2. Incident Response
  3. Limit Ports & Protocols
  4. Software Inventory
  5. Boundary Defense
  6. Secure Network
  7. Malware Defense
  8. Business Continuity
  9. The Alamo
  10. Account Monitoring
  11. bingo baker
  12. Security Awareness
  13. Secure Admin
  14. Data Protection
  15. Secure Config
  16. Data Recovery
  17. Vulner-ability MGMT