Replay Dumpster diving phishing Shoulder Surfing Impersonation DoS spear phishing ransomware token- based lock DNS Poisoning signature file Man- in-the- Middle Syn Flood DDoS Social Engineering spam baiting adware electronic lock worm Mantrap biometric lock Spoofing Tailgating spyware zero- hour conventional lock virus zero- day reconnaisaance trojan horse rootkit security Policy deadbolt lock Replay Dumpster diving phishing Shoulder Surfing Impersonation DoS spear phishing ransomware token- based lock DNS Poisoning signature file Man- in-the- Middle Syn Flood DDoS Social Engineering spam baiting adware electronic lock worm Mantrap biometric lock Spoofing Tailgating spyware zero- hour conventional lock virus zero- day reconnaisaance trojan horse rootkit security Policy deadbolt lock
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Replay
Dumpster diving
phishing
Shoulder Surfing
Impersonation
DoS
spear phishing
ransomware
token-based lock
DNS Poisoning
signature file
Man-in-the-Middle
Syn Flood
DDoS
Social Engineering
spam
baiting
adware
electronic lock
worm
Mantrap
biometric lock
Spoofing
Tailgating
spyware
zero-hour
conventional lock
virus
zero-day
reconnaisaance
trojan horse
rootkit
security Policy
deadbolt lock