Social Engineering Encryption Multi-Factor Authentication Spam White Hat hacker CTF Linux VPN Patch Backup DDoS The day Windows releases updates Software Server antivirus Cloud EXIF data Virus Binary SQL injection CVE ID number Rootkit Datacenter Keylogger Ransomware Password Post Request Firewall Black Hat hacker Backdoor Phishing Malware Trojan Private Key Encryption ISP Network Steganography Botnet Script Kiddie Man in the middle IoT Social Engineering Encryption Multi-Factor Authentication Spam White Hat hacker CTF Linux VPN Patch Backup DDoS The day Windows releases updates Software Server antivirus Cloud EXIF data Virus Binary SQL injection CVE ID number Rootkit Datacenter Keylogger Ransomware Password Post Request Firewall Black Hat hacker Backdoor Phishing Malware Trojan Private Key Encryption ISP Network Steganography Botnet Script Kiddie Man in the middle IoT
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Social Engineering
Encryption
Multi-Factor Authentication
Spam
White Hat hacker
CTF
Linux
VPN
Patch
Backup
DDoS
The day Windows releases updates
Software
Server
antivirus
Cloud
EXIF data
Virus
Binary
SQL injection
CVE ID number
Rootkit
Datacenter
Keylogger
Ransomware
Password
Post Request
Firewall
Black Hat hacker
Backdoor
Phishing
Malware
Trojan
Private Key Encryption
ISP
Network
Steganography
Botnet
Script Kiddie
Man in the middle
IoT