ISP Spam antivirus IoT Backdoor Network Botnet EXIF data SQL injection White Hat hacker Ransomware DDoS CTF Server Encryption The day Windows releases updates Rootkit Man in the middle Firewall VPN Patch Post Request Backup Social Engineering Password Software Virus Malware Trojan Linux CVE ID number Keylogger Private Key Encryption Multi-Factor Authentication Script Kiddie Cloud Steganography Black Hat hacker Binary Phishing Datacenter ISP Spam antivirus IoT Backdoor Network Botnet EXIF data SQL injection White Hat hacker Ransomware DDoS CTF Server Encryption The day Windows releases updates Rootkit Man in the middle Firewall VPN Patch Post Request Backup Social Engineering Password Software Virus Malware Trojan Linux CVE ID number Keylogger Private Key Encryption Multi-Factor Authentication Script Kiddie Cloud Steganography Black Hat hacker Binary Phishing Datacenter
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ISP
Spam
antivirus
IoT
Backdoor
Network
Botnet
EXIF data
SQL injection
White Hat hacker
Ransomware
DDoS
CTF
Server
Encryption
The day Windows releases updates
Rootkit
Man in the middle
Firewall
VPN
Patch
Post Request
Backup
Social Engineering
Password
Software
Virus
Malware
Trojan
Linux
CVE ID number
Keylogger
Private Key Encryption
Multi-Factor Authentication
Script Kiddie
Cloud
Steganography
Black Hat hacker
Binary
Phishing
Datacenter