Domain Forward to LM CIRT Thunder Turing One per service One- time Do not click on it Every time you leave your desk Social Engineering .NET Certificate Secure Sockets Layer Prevention Anonymous Digital Zero Vulnerabilities Sniffing Adware Stanford Wiretap Face ID End Furby Certified Chuck Norris IP Address Mouse Serial What’s happening at work (DHS) Using a password or passcode Plaintext LifeLock Open WEP McAfee Fast Tim Berners- Lee CISSP Protection Crowdstrike Kernel Knowledge Rest Architecture Intelligence Windows, L. Troy Distributed Contact security Protocol Domain Forward to LM CIRT Thunder Turing One per service One- time Do not click on it Every time you leave your desk Social Engineering .NET Certificate Secure Sockets Layer Prevention Anonymous Digital Zero Vulnerabilities Sniffing Adware Stanford Wiretap Face ID End Furby Certified Chuck Norris IP Address Mouse Serial What’s happening at work (DHS) Using a password or passcode Plaintext LifeLock Open WEP McAfee Fast Tim Berners- Lee CISSP Protection Crowdstrike Kernel Knowledge Rest Architecture Intelligence Windows, L. Troy Distributed Contact security Protocol
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Domain
Forward to LM CIRT
Thunder
Turing
One per service
One-time
Do not click on it
Every time you leave your desk
Social Engineering
.NET
Certificate
Secure Sockets Layer
Prevention
Anonymous
Digital
Zero
Vulnerabilities
Sniffing
Adware
Stanford
Wiretap
Face ID
End
Furby
Certified
Chuck Norris
IP Address
Mouse
Serial
What’s happening at work
(DHS)
Using a password or passcode
Plaintext
LifeLock
Open
WEP
McAfee
Fast
Tim Berners-Lee
CISSP
Protection
Crowdstrike
Kernel
Knowledge
Rest
Architecture
Intelligence
Windows, L.
Troy
Distributed
Contact security
Protocol