TroySniffing.NETCertifiedTuringChuckNorrisOpenLifeLockWhat’shappeningat workWiretapMcAfeeArchitectureProtectionDo notclick onitCISSPSerialSecureSocketsLayerOneperserviceMouseAnonymousIntelligenceDigitalAdwareWindows,L.Forwardto LMCIRTFaceIDSocialEngineeringPreventionWEPProtocolKernelPlaintextFastUsing apasswordorpasscodeTimBerners-LeeFurbyThunderEverytime youleave yourdeskZeroOne-timeVulnerabilitiesCrowdstrikeKnowledgeStanfordRestEndDomain(DHS)ContactsecurityDistributedIPAddressCertificateTroySniffing.NETCertifiedTuringChuckNorrisOpenLifeLockWhat’shappeningat workWiretapMcAfeeArchitectureProtectionDo notclick onitCISSPSerialSecureSocketsLayerOneperserviceMouseAnonymousIntelligenceDigitalAdwareWindows,L.Forwardto LMCIRTFaceIDSocialEngineeringPreventionWEPProtocolKernelPlaintextFastUsing apasswordorpasscodeTimBerners-LeeFurbyThunderEverytime youleave yourdeskZeroOne-timeVulnerabilitiesCrowdstrikeKnowledgeStanfordRestEndDomain(DHS)ContactsecurityDistributedIPAddressCertificate

CSAM 2023 Cyber Trivia Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
  1. Troy
  2. Sniffing
  3. .NET
  4. Certified
  5. Turing
  6. Chuck Norris
  7. Open
  8. LifeLock
  9. What’s happening at work
  10. Wiretap
  11. McAfee
  12. Architecture
  13. Protection
  14. Do not click on it
  15. CISSP
  16. Serial
  17. Secure Sockets Layer
  18. One per service
  19. Mouse
  20. Anonymous
  21. Intelligence
  22. Digital
  23. Adware
  24. Windows, L.
  25. Forward to LM CIRT
  26. Face ID
  27. Social Engineering
  28. Prevention
  29. WEP
  30. Protocol
  31. Kernel
  32. Plaintext
  33. Fast
  34. Using a password or passcode
  35. Tim Berners-Lee
  36. Furby
  37. Thunder
  38. Every time you leave your desk
  39. Zero
  40. One-time
  41. Vulnerabilities
  42. Crowdstrike
  43. Knowledge
  44. Stanford
  45. Rest
  46. End
  47. Domain
  48. (DHS)
  49. Contact security
  50. Distributed
  51. IP Address
  52. Certificate