ISBASoftwareBaselinePDSkillsMatrixISSOQueriesPDSTenableJSIGCPSOPSORCASTSAPSecurityClearanceAssessNMAPMontiorRISADAOJobCatalogGuideIvantiPumasDTASwitchSCARAReWANISSMNessusRoomDiagramTopologyDiagramSplunkSystemSecurityPlan(SSP)DataTransferRecordCategorizeConMonAuthorizeStrategicArchitectICONDAAPMCSSOPLogCollect32CFR117ATO-CDD254ClosedAreaTacticalArchitectRouterDAAPMH2HPrepareMaintenanceLogNISPOMISCPBasis ofEstimate(BOE)HubKiwiSyslogC3HardwareBaselineDCSADACHypervisorImplementEnable&EquipH2LContainerBaselineISOCategorizeL2HAdverseInformationSuspiciouscontactAntivirusPO&AMICDATOSelectVirtualMachinesInsiderthreatSCAPISBASoftwareBaselinePDSkillsMatrixISSOQueriesPDSTenableJSIGCPSOPSORCASTSAPSecurityClearanceAssessNMAPMontiorRISADAOJobCatalogGuideIvantiPumasDTASwitchSCARAReWANISSMNessusRoomDiagramTopologyDiagramSplunkSystemSecurityPlan(SSP)DataTransferRecordCategorizeConMonAuthorizeStrategicArchitectICONDAAPMCSSOPLogCollect32CFR117ATO-CDD254ClosedAreaTacticalArchitectRouterDAAPMH2HPrepareMaintenanceLogNISPOMISCPBasis ofEstimate(BOE)HubKiwiSyslogC3HardwareBaselineDCSADACHypervisorImplementEnable&EquipH2LContainerBaselineISOCategorizeL2HAdverseInformationSuspiciouscontactAntivirusPO&AMICDATOSelectVirtualMachinesInsiderthreatSCAP

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
  1. ISBA
  2. Software Baseline
  3. PD Skills Matrix
  4. ISSO Queries
  5. PDS
  6. Tenable
  7. JSIG
  8. CPSO
  9. PSO
  10. RCAST
  11. SAP
  12. Security Clearance
  13. Assess
  14. NMAP
  15. Montior
  16. RISA
  17. DAO
  18. Job Catalog Guide
  19. Ivanti
  20. Pumas
  21. DTA
  22. Switch
  23. SCA
  24. RAR
  25. eWAN
  26. ISSM
  27. Nessus
  28. Room Diagram
  29. Topology Diagram
  30. Splunk
  31. System Security Plan (SSP)
  32. Data Transfer Record
  33. Categorize
  34. ConMon
  35. Authorize
  36. Strategic Architect
  37. ICON
  38. DAAPM
  39. CS SOP
  40. LogCollect
  41. 32 CFR 117
  42. ATO-C
  43. DD254
  44. Closed Area
  45. Tactical Architect
  46. Router
  47. DAAPM
  48. H2H
  49. Prepare
  50. Maintenance Log
  51. NISPOM
  52. ISCP
  53. Basis of Estimate (BOE)
  54. Hub
  55. Kiwi Syslog
  56. C3
  57. Hardware Baseline
  58. DCSA
  59. DAC
  60. Hypervisor
  61. Implement
  62. Enable & Equip
  63. H2L
  64. Container Baseline
  65. ISO
  66. Categorize
  67. L2H
  68. Adverse Information
  69. Suspicious contact
  70. Antivirus
  71. PO&AM
  72. ICD
  73. ATO
  74. Select
  75. Virtual Machines
  76. Insider threat
  77. SCAP