DomainGroupPolicyTrojanhorseSymmetricOrganizationalUnitLocalAccountRADIUSActiveDirectoryManTrapgpupdate/forceEventViewer443FingerprintscannerUsername&passwordProgramFilesSmartcardMinimumPasswordAgeIncrementaladwareFullBackupUsersRead &ExecuteDifferential8021Modifysfc/scannowMostrestrictivewinsWEPAsymmetricDNSFullControlSiteGroupPolicyLeastrestrictivewinsRemoteDesktopspywareRetainpermissionsvirusReadAUPNATSMTPComplexityInheritpermissionsHashingWPA2LocalGroupPolicywormWriteSFTPDomainGroupPolicyTrojanhorseSymmetricOrganizationalUnitLocalAccountRADIUSActiveDirectoryManTrapgpupdate/forceEventViewer443FingerprintscannerUsername&passwordProgramFilesSmartcardMinimumPasswordAgeIncrementaladwareFullBackupUsersRead &ExecuteDifferential8021Modifysfc/scannowMostrestrictivewinsWEPAsymmetricDNSFullControlSiteGroupPolicyLeastrestrictivewinsRemoteDesktopspywareRetainpermissionsvirusReadAUPNATSMTPComplexityInheritpermissionsHashingWPA2LocalGroupPolicywormWriteSFTP

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Domain Group Policy
  2. Trojan horse
  3. Symmetric
  4. Organizational Unit
  5. Local Account
  6. RADIUS
  7. Active Directory
  8. Man Trap
  9. gpupdate /force
  10. Event Viewer
  11. 443
  12. Fingerprint scanner
  13. Username & password
  14. Program Files
  15. Smart card
  16. Minimum Password Age
  17. Incremental
  18. adware
  19. Full Backup
  20. Users
  21. Read & Execute
  22. Differential
  23. 80
  24. 21
  25. Modify
  26. sfc /scannow
  27. Most restrictive wins
  28. WEP
  29. Asymmetric
  30. DNS
  31. Full Control
  32. Site Group Policy
  33. Least restrictive wins
  34. Remote Desktop
  35. spyware
  36. Retain permissions
  37. virus
  38. Read
  39. AUP
  40. NAT
  41. SMTP
  42. Complexity
  43. Inherit permissions
  44. Hashing
  45. WPA2
  46. Local Group Policy
  47. worm
  48. Write
  49. SFTP