Enable&EquipATO-CNISPOMDAAPMISSOQueriesISBAClosedAreaSecurityClearanceImplementPrepareH2HSCARouterTenablePumasNMAPRARLogCollectISCPHypervisorSAPSuspiciouscontactISSMDTAJobCatalogGuideIvantiATOAntivirusConMonHardwareBaselineCPSOBasis ofEstimate(BOE)DAOVirtualMachinesCSSOPDCSARISAMaintenanceLogDAAPMSelectPO&AMPDSkillsMatrixDataTransferRecordC3TacticalArchitectDACSoftwareBaselineDD254SystemSecurityPlan(SSP)ContainerBaselineSwitchISOPSOSCAPSplunk32CFR117HubNessusCategorizeH2LJSIGTopologyDiagramAssessAdverseInformationRCASTKiwiSyslogInsiderthreatRoomDiagramICDICONeWANAuthorizeCategorizeL2HPDSStrategicArchitectMontiorEnable&EquipATO-CNISPOMDAAPMISSOQueriesISBAClosedAreaSecurityClearanceImplementPrepareH2HSCARouterTenablePumasNMAPRARLogCollectISCPHypervisorSAPSuspiciouscontactISSMDTAJobCatalogGuideIvantiATOAntivirusConMonHardwareBaselineCPSOBasis ofEstimate(BOE)DAOVirtualMachinesCSSOPDCSARISAMaintenanceLogDAAPMSelectPO&AMPDSkillsMatrixDataTransferRecordC3TacticalArchitectDACSoftwareBaselineDD254SystemSecurityPlan(SSP)ContainerBaselineSwitchISOPSOSCAPSplunk32CFR117HubNessusCategorizeH2LJSIGTopologyDiagramAssessAdverseInformationRCASTKiwiSyslogInsiderthreatRoomDiagramICDICONeWANAuthorizeCategorizeL2HPDSStrategicArchitectMontior

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
  1. Enable & Equip
  2. ATO-C
  3. NISPOM
  4. DAAPM
  5. ISSO Queries
  6. ISBA
  7. Closed Area
  8. Security Clearance
  9. Implement
  10. Prepare
  11. H2H
  12. SCA
  13. Router
  14. Tenable
  15. Pumas
  16. NMAP
  17. RAR
  18. LogCollect
  19. ISCP
  20. Hypervisor
  21. SAP
  22. Suspicious contact
  23. ISSM
  24. DTA
  25. Job Catalog Guide
  26. Ivanti
  27. ATO
  28. Antivirus
  29. ConMon
  30. Hardware Baseline
  31. CPSO
  32. Basis of Estimate (BOE)
  33. DAO
  34. Virtual Machines
  35. CS SOP
  36. DCSA
  37. RISA
  38. Maintenance Log
  39. DAAPM
  40. Select
  41. PO&AM
  42. PD Skills Matrix
  43. Data Transfer Record
  44. C3
  45. Tactical Architect
  46. DAC
  47. Software Baseline
  48. DD254
  49. System Security Plan (SSP)
  50. Container Baseline
  51. Switch
  52. ISO
  53. PSO
  54. SCAP
  55. Splunk
  56. 32 CFR 117
  57. Hub
  58. Nessus
  59. Categorize
  60. H2L
  61. JSIG
  62. Topology Diagram
  63. Assess
  64. Adverse Information
  65. RCAST
  66. Kiwi Syslog
  67. Insider threat
  68. Room Diagram
  69. ICD
  70. ICON
  71. eWAN
  72. Authorize
  73. Categorize
  74. L2H
  75. PDS
  76. Strategic Architect
  77. Montior