Trojanhorsesfc/scannowSmartcardDNSReadFullBackupNATSMTP80LocalGroupPolicyDifferentialRemoteDesktopAsymmetricRetainpermissionsgpupdate/forceMinimumPasswordAgeFullControlspywareEventViewerIncrementalActiveDirectoryRADIUS443FingerprintscannerHashingLocalAccountUsersWEPModifySymmetricOrganizationalUnitwormRead &ExecuteMostrestrictivewinsSFTPProgramFilesManTrapvirusUsername&passwordLeastrestrictivewinsInheritpermissionsWriteComplexityWPA2SiteGroupPolicyadwareDomainGroupPolicyAUP21Trojanhorsesfc/scannowSmartcardDNSReadFullBackupNATSMTP80LocalGroupPolicyDifferentialRemoteDesktopAsymmetricRetainpermissionsgpupdate/forceMinimumPasswordAgeFullControlspywareEventViewerIncrementalActiveDirectoryRADIUS443FingerprintscannerHashingLocalAccountUsersWEPModifySymmetricOrganizationalUnitwormRead &ExecuteMostrestrictivewinsSFTPProgramFilesManTrapvirusUsername&passwordLeastrestrictivewinsInheritpermissionsWriteComplexityWPA2SiteGroupPolicyadwareDomainGroupPolicyAUP21

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Trojan horse
  2. sfc /scannow
  3. Smart card
  4. DNS
  5. Read
  6. Full Backup
  7. NAT
  8. SMTP
  9. 80
  10. Local Group Policy
  11. Differential
  12. Remote Desktop
  13. Asymmetric
  14. Retain permissions
  15. gpupdate /force
  16. Minimum Password Age
  17. Full Control
  18. spyware
  19. Event Viewer
  20. Incremental
  21. Active Directory
  22. RADIUS
  23. 443
  24. Fingerprint scanner
  25. Hashing
  26. Local Account
  27. Users
  28. WEP
  29. Modify
  30. Symmetric
  31. Organizational Unit
  32. worm
  33. Read & Execute
  34. Most restrictive wins
  35. SFTP
  36. Program Files
  37. Man Trap
  38. virus
  39. Username & password
  40. Least restrictive wins
  41. Inherit permissions
  42. Write
  43. Complexity
  44. WPA2
  45. Site Group Policy
  46. adware
  47. Domain Group Policy
  48. AUP
  49. 21