Ransomware CTF Trojan Botnet Encryption Rootkit Network Phishing Backup Keylogger Multi-Factor Authentication Malware IoT Script Kiddie Firewall antivirus Steganography EXIF data Spam Software Datacenter Backdoor Binary Server Black Hat hacker The day Windows releases updates DDoS ISP SQL injection Social Engineering Private Key Encryption Cloud Password Post Request Patch White Hat hacker CVE ID number Linux VPN Virus Man in the middle Ransomware CTF Trojan Botnet Encryption Rootkit Network Phishing Backup Keylogger Multi-Factor Authentication Malware IoT Script Kiddie Firewall antivirus Steganography EXIF data Spam Software Datacenter Backdoor Binary Server Black Hat hacker The day Windows releases updates DDoS ISP SQL injection Social Engineering Private Key Encryption Cloud Password Post Request Patch White Hat hacker CVE ID number Linux VPN Virus Man in the middle
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Ransomware
CTF
Trojan
Botnet
Encryption
Rootkit
Network
Phishing
Backup
Keylogger
Multi-Factor Authentication
Malware
IoT
Script Kiddie
Firewall
antivirus
Steganography
EXIF data
Spam
Software
Datacenter
Backdoor
Binary
Server
Black Hat hacker
The day Windows releases updates
DDoS
ISP
SQL injection
Social Engineering
Private Key Encryption
Cloud
Password
Post Request
Patch
White Hat hacker
CVE ID number
Linux
VPN
Virus
Man in the middle