BIOSVirusDNSPoisoningWormSpoofingE-mailBombMan-in-the MiddleattackDDoSAttackInternalSSIDSYNFloodAttackActiveXJavaScriptReplayAttackPing ofDeathSpamExternalSpywareTrojanHorseJavaDoSAttackPhishingAdwareDataWipingBIOSVirusDNSPoisoningWormSpoofingE-mailBombMan-in-the MiddleattackDDoSAttackInternalSSIDSYNFloodAttackActiveXJavaScriptReplayAttackPing ofDeathSpamExternalSpywareTrojanHorseJavaDoSAttackPhishingAdwareDataWiping

Chapter 9: Secruity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. BIOS
  2. Virus
  3. DNS Poisoning
  4. Worm
  5. Spoofing
  6. E-mail Bomb
  7. Man-in-the Middle attack
  8. DDoS Attack
  9. Internal
  10. SSID
  11. SYN Flood Attack
  12. ActiveX
  13. Java Script
  14. Replay Attack
  15. Ping of Death
  16. Spam
  17. External
  18. Spyware
  19. Trojan Horse
  20. Java
  21. DoS Attack
  22. Phishing
  23. Adware
  24. Data Wiping