FullBackup80TrojanhorseIncrementalLocalAccountOrganizationalUnitRemoteDesktopComplexitywormspywareSMTPRetainpermissionsFingerprintscannerRead &ExecuteManTrapActiveDirectorygpupdate/forceSFTPLeastrestrictivewinsWPA2EventViewerAsymmetricLocalGroupPolicyProgramFilesDNSFullControlvirusNATReadRADIUSSiteGroupPolicyDomainGroupPolicyUsers443MinimumPasswordAge21Modifysfc/scannowSmartcardadwareWriteSymmetricAUPInheritpermissionsWEPMostrestrictivewinsDifferentialUsername&passwordHashingFullBackup80TrojanhorseIncrementalLocalAccountOrganizationalUnitRemoteDesktopComplexitywormspywareSMTPRetainpermissionsFingerprintscannerRead &ExecuteManTrapActiveDirectorygpupdate/forceSFTPLeastrestrictivewinsWPA2EventViewerAsymmetricLocalGroupPolicyProgramFilesDNSFullControlvirusNATReadRADIUSSiteGroupPolicyDomainGroupPolicyUsers443MinimumPasswordAge21Modifysfc/scannowSmartcardadwareWriteSymmetricAUPInheritpermissionsWEPMostrestrictivewinsDifferentialUsername&passwordHashing

Cyber Security - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Full Backup
  2. 80
  3. Trojan horse
  4. Incremental
  5. Local Account
  6. Organizational Unit
  7. Remote Desktop
  8. Complexity
  9. worm
  10. spyware
  11. SMTP
  12. Retain permissions
  13. Fingerprint scanner
  14. Read & Execute
  15. Man Trap
  16. Active Directory
  17. gpupdate /force
  18. SFTP
  19. Least restrictive wins
  20. WPA2
  21. Event Viewer
  22. Asymmetric
  23. Local Group Policy
  24. Program Files
  25. DNS
  26. Full Control
  27. virus
  28. NAT
  29. Read
  30. RADIUS
  31. Site Group Policy
  32. Domain Group Policy
  33. Users
  34. 443
  35. Minimum Password Age
  36. 21
  37. Modify
  38. sfc /scannow
  39. Smart card
  40. adware
  41. Write
  42. Symmetric
  43. AUP
  44. Inherit permissions
  45. WEP
  46. Most restrictive wins
  47. Differential
  48. Username & password
  49. Hashing