E-mailBombReplayAttackExternalPing ofDeathSpamMan-in-the MiddleattackSpoofingAdwareSSIDDataWipingPhishingJavaDNSPoisoningActiveXDoSAttackSYNFloodAttackTrojanHorseVirusJavaScriptWormBIOSDDoSAttackSpywareInternalE-mailBombReplayAttackExternalPing ofDeathSpamMan-in-the MiddleattackSpoofingAdwareSSIDDataWipingPhishingJavaDNSPoisoningActiveXDoSAttackSYNFloodAttackTrojanHorseVirusJavaScriptWormBIOSDDoSAttackSpywareInternal

Chapter 9: Secruity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. E-mail Bomb
  2. Replay Attack
  3. External
  4. Ping of Death
  5. Spam
  6. Man-in-the Middle attack
  7. Spoofing
  8. Adware
  9. SSID
  10. Data Wiping
  11. Phishing
  12. Java
  13. DNS Poisoning
  14. ActiveX
  15. DoS Attack
  16. SYN Flood Attack
  17. Trojan Horse
  18. Virus
  19. Java Script
  20. Worm
  21. BIOS
  22. DDoS Attack
  23. Spyware
  24. Internal