PhishingHinterein-ander-schaltungFirewallAgentMassen-angriffTrojanerFrauenfußballAnti-Hacker-BuchSasser-WurmSpamViren-programmIndustrie-spionagePenetration-TestSniffer-ProgrammSocial-EngineeringKeyloggerHotspotIDSCrackerHacker-programmEmail-AnhangBSIPaaaswortChattenDOS-AngriffPhishingHinterein-ander-schaltungFirewallAgentMassen-angriffTrojanerFrauenfußballAnti-Hacker-BuchSasser-WurmSpamViren-programmIndustrie-spionagePenetration-TestSniffer-ProgrammSocial-EngineeringKeyloggerHotspotIDSCrackerHacker-programmEmail-AnhangBSIPaaaswortChattenDOS-Angriff

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Phishing
  2. Hinterein-ander-schaltung
  3. Firewall
  4. Agent
  5. Massen-angriff
  6. Trojaner
  7. Frauenfußball
  8. Anti-Hacker-Buch
  9. Sasser- Wurm
  10. Spam
  11. Viren-programm
  12. Industrie-spionage
  13. Penetration-Test
  14. Sniffer-Programm
  15. Social-Engineering
  16. Keylogger
  17. Hotspot
  18. IDS
  19. Cracker
  20. Hacker-programm
  21. Email-Anhang
  22. BSI
  23. Paaaswort
  24. Chatten
  25. DOS-Angriff