Read &ExecuteRetainpermissionsComplexityRADIUSLeastrestrictivewinsTrojanhorsespywareAsymmetricFingerprintscannerAUP443OrganizationalUnitActiveDirectoryIncrementalUsername&passwordLocalGroupPolicyEventViewerProgramFilesRemoteDesktopSiteGroupPolicywormWEPLocalAccountHashingWPA2FullControlWriteModifyReadSFTPDNSadwareFullBackupManTrapvirusDomainGroupPolicyInheritpermissionsMinimumPasswordAgeDifferentialMostrestrictivewinsNATsfc/scannowgpupdate/force21SMTPSymmetric80UsersSmartcardRead &ExecuteRetainpermissionsComplexityRADIUSLeastrestrictivewinsTrojanhorsespywareAsymmetricFingerprintscannerAUP443OrganizationalUnitActiveDirectoryIncrementalUsername&passwordLocalGroupPolicyEventViewerProgramFilesRemoteDesktopSiteGroupPolicywormWEPLocalAccountHashingWPA2FullControlWriteModifyReadSFTPDNSadwareFullBackupManTrapvirusDomainGroupPolicyInheritpermissionsMinimumPasswordAgeDifferentialMostrestrictivewinsNATsfc/scannowgpupdate/force21SMTPSymmetric80UsersSmartcard

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Read & Execute
  2. Retain permissions
  3. Complexity
  4. RADIUS
  5. Least restrictive wins
  6. Trojan horse
  7. spyware
  8. Asymmetric
  9. Fingerprint scanner
  10. AUP
  11. 443
  12. Organizational Unit
  13. Active Directory
  14. Incremental
  15. Username & password
  16. Local Group Policy
  17. Event Viewer
  18. Program Files
  19. Remote Desktop
  20. Site Group Policy
  21. worm
  22. WEP
  23. Local Account
  24. Hashing
  25. WPA2
  26. Full Control
  27. Write
  28. Modify
  29. Read
  30. SFTP
  31. DNS
  32. adware
  33. Full Backup
  34. Man Trap
  35. virus
  36. Domain Group Policy
  37. Inherit permissions
  38. Minimum Password Age
  39. Differential
  40. Most restrictive wins
  41. NAT
  42. sfc /scannow
  43. gpupdate /force
  44. 21
  45. SMTP
  46. Symmetric
  47. 80
  48. Users
  49. Smart card