ThreatCloudInternetLekNCSCVPNSpoofingupdatenVulnerabilityMalwareJavaHardwareBeveiligingFraudeApachePhishingFirewallRiskassessmentCVEEncryptieFirewallSSOCyberTrojanTrojanhorseWormImpactPrivacyWachtwoordsupportMitigatieMulti-factorauthenticationKwetsbaar-heidServiceDeskSoftwarerisicoCyber"Patch"esO'HoulihanThreatCloudInternetLekNCSCVPNSpoofingupdatenVulnerabilityMalwareJavaHardwareBeveiligingFraudeApachePhishingFirewallRiskassessmentCVEEncryptieFirewallSSOCyberTrojanTrojanhorseWormImpactPrivacyWachtwoordsupportMitigatieMulti-factorauthenticationKwetsbaar-heidServiceDeskSoftwarerisicoCyber"Patch"esO'Houlihan

IT-informatiesessie kwetsbaarheid Log4j - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Threat
  2. Cloud
  3. Internet
  4. Lek
  5. NCSC
  6. VPN
  7. Spoofing
  8. updaten
  9. Vulnerability
  10. Malware
  11. Java
  12. Hardware
  13. Beveiliging
  14. Fraude
  15. Apache
  16. Phishing
  17. Firewall
  18. Risk assessment
  19. CVE
  20. Encryptie
  21. Firewall
  22. SSO
  23. Cyber
  24. Trojan
  25. Trojan horse
  26. Worm
  27. Impact
  28. Privacy
  29. Wachtwoord
  30. support
  31. Mitigatie
  32. Multi-factor authentication
  33. Kwetsbaar-heid
  34. Service Desk
  35. Software
  36. risico
  37. Cyber
  38. "Patch"es O'Houlihan