ThreatKwetsbaar-heidPhishingInternetTrojanLekCVECloudCyberVulnerabilityFirewallSpoofing"Patch"esO'HoulihanApacheupdatenHardwareFirewallServiceDeskVPNCyberTrojanhorseJavarisicoWormMulti-factorauthenticationMitigatieWachtwoordRiskassessmentSoftwareNCSCPrivacyEncryptiesupportFraudeImpactMalwareSSOBeveiligingThreatKwetsbaar-heidPhishingInternetTrojanLekCVECloudCyberVulnerabilityFirewallSpoofing"Patch"esO'HoulihanApacheupdatenHardwareFirewallServiceDeskVPNCyberTrojanhorseJavarisicoWormMulti-factorauthenticationMitigatieWachtwoordRiskassessmentSoftwareNCSCPrivacyEncryptiesupportFraudeImpactMalwareSSOBeveiliging

IT-informatiesessie kwetsbaarheid Log4j - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
  1. Threat
  2. Kwetsbaar-heid
  3. Phishing
  4. Internet
  5. Trojan
  6. Lek
  7. CVE
  8. Cloud
  9. Cyber
  10. Vulnerability
  11. Firewall
  12. Spoofing
  13. "Patch"es O'Houlihan
  14. Apache
  15. updaten
  16. Hardware
  17. Firewall
  18. Service Desk
  19. VPN
  20. Cyber
  21. Trojan horse
  22. Java
  23. risico
  24. Worm
  25. Multi-factor authentication
  26. Mitigatie
  27. Wachtwoord
  28. Risk assessment
  29. Software
  30. NCSC
  31. Privacy
  32. Encryptie
  33. support
  34. Fraude
  35. Impact
  36. Malware
  37. SSO
  38. Beveiliging