Mantrap worm zero- hour spyware conventional lock DNS Poisoning baiting Spoofing Replay electronic lock rootkit trojan horse deadbolt lock Impersonation reconnaisaance DDoS biometric lock security Policy DoS adware phishing spam virus spear phishing token- based lock Tailgating Shoulder Surfing Dumpster diving Man- in-the- Middle ransomware Social Engineering Syn Flood zero- day signature file Mantrap worm zero- hour spyware conventional lock DNS Poisoning baiting Spoofing Replay electronic lock rootkit trojan horse deadbolt lock Impersonation reconnaisaance DDoS biometric lock security Policy DoS adware phishing spam virus spear phishing token- based lock Tailgating Shoulder Surfing Dumpster diving Man- in-the- Middle ransomware Social Engineering Syn Flood zero- day signature file
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Mantrap
worm
zero-hour
spyware
conventional lock
DNS Poisoning
baiting
Spoofing
Replay
electronic lock
rootkit
trojan horse
deadbolt lock
Impersonation
reconnaisaance
DDoS
biometric lock
security Policy
DoS
adware
phishing
spam
virus
spear phishing
token-based lock
Tailgating
Shoulder Surfing
Dumpster diving
Man-in-the-Middle
ransomware
Social Engineering
Syn Flood
zero-day
signature file