AgentPenetration-TestFirewallCrackerSpamChattenKeyloggerSocial-EngineeringIDSBSIHotspotHacker-programmPhishingFrauenfußballPaaaswortTrojanerSasser-WurmSniffer-ProgrammDOS-AngriffViren-programmHinterein-ander-schaltungAnti-Hacker-BuchEmail-AnhangIndustrie-spionageMassen-angriffAgentPenetration-TestFirewallCrackerSpamChattenKeyloggerSocial-EngineeringIDSBSIHotspotHacker-programmPhishingFrauenfußballPaaaswortTrojanerSasser-WurmSniffer-ProgrammDOS-AngriffViren-programmHinterein-ander-schaltungAnti-Hacker-BuchEmail-AnhangIndustrie-spionageMassen-angriff

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Agent
  2. Penetration-Test
  3. Firewall
  4. Cracker
  5. Spam
  6. Chatten
  7. Keylogger
  8. Social-Engineering
  9. IDS
  10. BSI
  11. Hotspot
  12. Hacker-programm
  13. Phishing
  14. Frauenfußball
  15. Paaaswort
  16. Trojaner
  17. Sasser- Wurm
  18. Sniffer-Programm
  19. DOS-Angriff
  20. Viren-programm
  21. Hinterein-ander-schaltung
  22. Anti-Hacker-Buch
  23. Email-Anhang
  24. Industrie-spionage
  25. Massen-angriff