Trojan horse sfc /scannow Smart card DNS Read Full Backup NAT SMTP 80 Local Group Policy Differential Remote Desktop Asymmetric Retain permissions gpupdate /force Minimum Password Age Full Control spyware Event Viewer Incremental Active Directory RADIUS 443 Fingerprint scanner Hashing Local Account Users WEP Modify Symmetric Organizational Unit worm Read & Execute Most restrictive wins SFTP Program Files Man Trap virus Username & password Least restrictive wins Inherit permissions Write Complexity WPA2 Site Group Policy adware Domain Group Policy AUP 21 Trojan horse sfc /scannow Smart card DNS Read Full Backup NAT SMTP 80 Local Group Policy Differential Remote Desktop Asymmetric Retain permissions gpupdate /force Minimum Password Age Full Control spyware Event Viewer Incremental Active Directory RADIUS 443 Fingerprint scanner Hashing Local Account Users WEP Modify Symmetric Organizational Unit worm Read & Execute Most restrictive wins SFTP Program Files Man Trap virus Username & password Least restrictive wins Inherit permissions Write Complexity WPA2 Site Group Policy adware Domain Group Policy AUP 21
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Trojan horse
sfc /scannow
Smart card
DNS
Read
Full Backup
NAT
SMTP
80
Local Group Policy
Differential
Remote Desktop
Asymmetric
Retain permissions
gpupdate /force
Minimum Password Age
Full Control
spyware
Event Viewer
Incremental
Active Directory
RADIUS
443
Fingerprint scanner
Hashing
Local Account
Users
WEP
Modify
Symmetric
Organizational Unit
worm
Read & Execute
Most restrictive wins
SFTP
Program Files
Man Trap
virus
Username & password
Least restrictive wins
Inherit permissions
Write
Complexity
WPA2
Site Group Policy
adware
Domain Group Policy
AUP
21