Complexitygpupdate/forceDNSProgramFilesUsersRADIUSDifferentialsfc/scannowAUPWPA2FullBackupSMTPwormspywareAsymmetricSiteGroupPolicyActiveDirectoryReadWEPRead &ExecuteSFTPadware8021FingerprintscannerModifyLocalAccountMinimumPasswordAgeInheritpermissionsRetainpermissionsOrganizationalUnitLeastrestrictivewinsFullControlEventViewer443DomainGroupPolicyIncrementalMostrestrictivewinsUsername&passwordNATWriteHashingTrojanhorsevirusRemoteDesktopSmartcardLocalGroupPolicySymmetricManTrapComplexitygpupdate/forceDNSProgramFilesUsersRADIUSDifferentialsfc/scannowAUPWPA2FullBackupSMTPwormspywareAsymmetricSiteGroupPolicyActiveDirectoryReadWEPRead &ExecuteSFTPadware8021FingerprintscannerModifyLocalAccountMinimumPasswordAgeInheritpermissionsRetainpermissionsOrganizationalUnitLeastrestrictivewinsFullControlEventViewer443DomainGroupPolicyIncrementalMostrestrictivewinsUsername&passwordNATWriteHashingTrojanhorsevirusRemoteDesktopSmartcardLocalGroupPolicySymmetricManTrap

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Complexity
  2. gpupdate /force
  3. DNS
  4. Program Files
  5. Users
  6. RADIUS
  7. Differential
  8. sfc /scannow
  9. AUP
  10. WPA2
  11. Full Backup
  12. SMTP
  13. worm
  14. spyware
  15. Asymmetric
  16. Site Group Policy
  17. Active Directory
  18. Read
  19. WEP
  20. Read & Execute
  21. SFTP
  22. adware
  23. 80
  24. 21
  25. Fingerprint scanner
  26. Modify
  27. Local Account
  28. Minimum Password Age
  29. Inherit permissions
  30. Retain permissions
  31. Organizational Unit
  32. Least restrictive wins
  33. Full Control
  34. Event Viewer
  35. 443
  36. Domain Group Policy
  37. Incremental
  38. Most restrictive wins
  39. Username & password
  40. NAT
  41. Write
  42. Hashing
  43. Trojan horse
  44. virus
  45. Remote Desktop
  46. Smart card
  47. Local Group Policy
  48. Symmetric
  49. Man Trap