FirewallChattenViren-programmSasser-WurmHinterein-ander-schaltungCrackerIDSPhishingEmail-AnhangBSISocial-EngineeringHacker-programmAnti-Hacker-BuchIndustrie-spionageFrauenfußballSpamDOS-AngriffPaaaswortTrojanerMassen-angriffPenetration-TestSniffer-ProgrammAgentHotspotKeyloggerFirewallChattenViren-programmSasser-WurmHinterein-ander-schaltungCrackerIDSPhishingEmail-AnhangBSISocial-EngineeringHacker-programmAnti-Hacker-BuchIndustrie-spionageFrauenfußballSpamDOS-AngriffPaaaswortTrojanerMassen-angriffPenetration-TestSniffer-ProgrammAgentHotspotKeylogger

IT Management Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Firewall
  2. Chatten
  3. Viren-programm
  4. Sasser- Wurm
  5. Hinterein-ander-schaltung
  6. Cracker
  7. IDS
  8. Phishing
  9. Email-Anhang
  10. BSI
  11. Social-Engineering
  12. Hacker-programm
  13. Anti-Hacker-Buch
  14. Industrie-spionage
  15. Frauenfußball
  16. Spam
  17. DOS-Angriff
  18. Paaaswort
  19. Trojaner
  20. Massen-angriff
  21. Penetration-Test
  22. Sniffer-Programm
  23. Agent
  24. Hotspot
  25. Keylogger