zero- day Replay Social Engineering spyware Tailgating Shoulder Surfing biometric lock Dumpster diving Mantrap worm DDoS spam deadbolt lock Syn Flood security Policy Spoofing reconnaisaance electronic lock phishing Impersonation DoS zero- hour spear phishing token- based lock DNS Poisoning trojan horse signature file ransomware baiting virus adware rootkit Man- in-the- Middle conventional lock zero- day Replay Social Engineering spyware Tailgating Shoulder Surfing biometric lock Dumpster diving Mantrap worm DDoS spam deadbolt lock Syn Flood security Policy Spoofing reconnaisaance electronic lock phishing Impersonation DoS zero- hour spear phishing token- based lock DNS Poisoning trojan horse signature file ransomware baiting virus adware rootkit Man- in-the- Middle conventional lock
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
zero-day
Replay
Social Engineering
spyware
Tailgating
Shoulder Surfing
biometric lock
Dumpster diving
Mantrap
worm
DDoS
spam
deadbolt lock
Syn Flood
security Policy
Spoofing
reconnaisaance
electronic lock
phishing
Impersonation
DoS
zero-hour
spear phishing
token-based lock
DNS Poisoning
trojan horse
signature file
ransomware
baiting
virus
adware
rootkit
Man-in-the-Middle
conventional lock