Troy Sniffing .NET Certified Turing Chuck Norris Open LifeLock What’s happening at work Wiretap McAfee Architecture Protection Do not click on it CISSP Serial Secure Sockets Layer One per service Mouse Anonymous Intelligence Digital Adware Windows, L. Forward to LM CIRT Face ID Social Engineering Prevention WEP Protocol Kernel Plaintext Fast Using a password or passcode Tim Berners- Lee Furby Thunder Every time you leave your desk Zero One- time Vulnerabilities Crowdstrike Knowledge Stanford Rest End Domain (DHS) Contact security Distributed IP Address Certificate Troy Sniffing .NET Certified Turing Chuck Norris Open LifeLock What’s happening at work Wiretap McAfee Architecture Protection Do not click on it CISSP Serial Secure Sockets Layer One per service Mouse Anonymous Intelligence Digital Adware Windows, L. Forward to LM CIRT Face ID Social Engineering Prevention WEP Protocol Kernel Plaintext Fast Using a password or passcode Tim Berners- Lee Furby Thunder Every time you leave your desk Zero One- time Vulnerabilities Crowdstrike Knowledge Stanford Rest End Domain (DHS) Contact security Distributed IP Address Certificate
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Troy
Sniffing
.NET
Certified
Turing
Chuck Norris
Open
LifeLock
What’s happening at work
Wiretap
McAfee
Architecture
Protection
Do not click on it
CISSP
Serial
Secure Sockets Layer
One per service
Mouse
Anonymous
Intelligence
Digital
Adware
Windows, L.
Forward to LM CIRT
Face ID
Social Engineering
Prevention
WEP
Protocol
Kernel
Plaintext
Fast
Using a password or passcode
Tim Berners-Lee
Furby
Thunder
Every time you leave your desk
Zero
One-time
Vulnerabilities
Crowdstrike
Knowledge
Stanford
Rest
End
Domain
(DHS)
Contact security
Distributed
IP Address
Certificate