Mantrapwormzero-hourspywareconventionallockDNSPoisoningbaitingSpoofingReplayelectroniclockrootkittrojanhorsedeadboltlockImpersonationreconnaisaanceDDoSbiometriclocksecurityPolicyDoSadwarephishingspamvirusspearphishingtoken-basedlockTailgatingShoulderSurfingDumpsterdivingMan-in-the-MiddleransomwareSocialEngineeringSynFloodzero-daysignaturefileMantrapwormzero-hourspywareconventionallockDNSPoisoningbaitingSpoofingReplayelectroniclockrootkittrojanhorsedeadboltlockImpersonationreconnaisaanceDDoSbiometriclocksecurityPolicyDoSadwarephishingspamvirusspearphishingtoken-basedlockTailgatingShoulderSurfingDumpsterdivingMan-in-the-MiddleransomwareSocialEngineeringSynFloodzero-daysignaturefile

Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
  1. Mantrap
  2. worm
  3. zero-hour
  4. spyware
  5. conventional lock
  6. DNS Poisoning
  7. baiting
  8. Spoofing
  9. Replay
  10. electronic lock
  11. rootkit
  12. trojan horse
  13. deadbolt lock
  14. Impersonation
  15. reconnaisaance
  16. DDoS
  17. biometric lock
  18. security Policy
  19. DoS
  20. adware
  21. phishing
  22. spam
  23. virus
  24. spear phishing
  25. token-based lock
  26. Tailgating
  27. Shoulder Surfing
  28. Dumpster diving
  29. Man-in-the-Middle
  30. ransomware
  31. Social Engineering
  32. Syn Flood
  33. zero-day
  34. signature file