Readsfc/scannowIncrementalProgramFilesEventViewerRemoteDesktopInheritpermissionsOrganizationalUnitFullBackupLeastrestrictivewinsSmartcard21SFTPwormUsername&passwordvirusUsersComplexityDifferentialgpupdate/forceModifyManTrapRADIUSLocalAccountAUPActiveDirectoryMostrestrictivewins443WriteRead &ExecuteLocalGroupPolicyFingerprintscanner80WEPadwareHashingSiteGroupPolicyFullControlAsymmetricSymmetricDomainGroupPolicyMinimumPasswordAgespywareSMTPDNSRetainpermissionsWPA2TrojanhorseNATReadsfc/scannowIncrementalProgramFilesEventViewerRemoteDesktopInheritpermissionsOrganizationalUnitFullBackupLeastrestrictivewinsSmartcard21SFTPwormUsername&passwordvirusUsersComplexityDifferentialgpupdate/forceModifyManTrapRADIUSLocalAccountAUPActiveDirectoryMostrestrictivewins443WriteRead &ExecuteLocalGroupPolicyFingerprintscanner80WEPadwareHashingSiteGroupPolicyFullControlAsymmetricSymmetricDomainGroupPolicyMinimumPasswordAgespywareSMTPDNSRetainpermissionsWPA2TrojanhorseNAT

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Read
  2. sfc /scannow
  3. Incremental
  4. Program Files
  5. Event Viewer
  6. Remote Desktop
  7. Inherit permissions
  8. Organizational Unit
  9. Full Backup
  10. Least restrictive wins
  11. Smart card
  12. 21
  13. SFTP
  14. worm
  15. Username & password
  16. virus
  17. Users
  18. Complexity
  19. Differential
  20. gpupdate /force
  21. Modify
  22. Man Trap
  23. RADIUS
  24. Local Account
  25. AUP
  26. Active Directory
  27. Most restrictive wins
  28. 443
  29. Write
  30. Read & Execute
  31. Local Group Policy
  32. Fingerprint scanner
  33. 80
  34. WEP
  35. adware
  36. Hashing
  37. Site Group Policy
  38. Full Control
  39. Asymmetric
  40. Symmetric
  41. Domain Group Policy
  42. Minimum Password Age
  43. spyware
  44. SMTP
  45. DNS
  46. Retain permissions
  47. WPA2
  48. Trojan horse
  49. NAT