LocalAccountMinimumPasswordAgeIncrementalReadSymmetricadwareRemoteDesktopSiteGroupPolicy44321WEPComplexityHashingDomainGroupPolicyRead &ExecuteLocalGroupPolicyDNSsfc/scannowUserswormAUPProgramFilesvirusDifferentialRetainpermissionsFullControlSMTP80ActiveDirectoryWPA2FingerprintscannerSFTPMostrestrictivewinsLeastrestrictivewinsOrganizationalUnitspywareWriteFullBackupInheritpermissionsSmartcardNATManTrapUsername&passwordModifyAsymmetricTrojanhorseEventViewerRADIUSgpupdate/forceLocalAccountMinimumPasswordAgeIncrementalReadSymmetricadwareRemoteDesktopSiteGroupPolicy44321WEPComplexityHashingDomainGroupPolicyRead &ExecuteLocalGroupPolicyDNSsfc/scannowUserswormAUPProgramFilesvirusDifferentialRetainpermissionsFullControlSMTP80ActiveDirectoryWPA2FingerprintscannerSFTPMostrestrictivewinsLeastrestrictivewinsOrganizationalUnitspywareWriteFullBackupInheritpermissionsSmartcardNATManTrapUsername&passwordModifyAsymmetricTrojanhorseEventViewerRADIUSgpupdate/force

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Local Account
  2. Minimum Password Age
  3. Incremental
  4. Read
  5. Symmetric
  6. adware
  7. Remote Desktop
  8. Site Group Policy
  9. 443
  10. 21
  11. WEP
  12. Complexity
  13. Hashing
  14. Domain Group Policy
  15. Read & Execute
  16. Local Group Policy
  17. DNS
  18. sfc /scannow
  19. Users
  20. worm
  21. AUP
  22. Program Files
  23. virus
  24. Differential
  25. Retain permissions
  26. Full Control
  27. SMTP
  28. 80
  29. Active Directory
  30. WPA2
  31. Fingerprint scanner
  32. SFTP
  33. Most restrictive wins
  34. Least restrictive wins
  35. Organizational Unit
  36. spyware
  37. Write
  38. Full Backup
  39. Inherit permissions
  40. Smart card
  41. NAT
  42. Man Trap
  43. Username & password
  44. Modify
  45. Asymmetric
  46. Trojan horse
  47. Event Viewer
  48. RADIUS
  49. gpupdate /force