Zero Day Types of Hackers Recover smishing Two-Factor Authentication SSL Decrypt Protect PassPhase Detect Firewall Secure Email Phishing Secure Password Security Awareness Training Identify VPN Risk Assessment Least Privilege Patch Management Respond Advanced Persistent Threat Vishing Spear Phishing Asset Management Data Discovery Malware Antivirus Whaling spearphishing Zero Day Types of Hackers Recover smishing Two-Factor Authentication SSL Decrypt Protect PassPhase Detect Firewall Secure Email Phishing Secure Password Security Awareness Training Identify VPN Risk Assessment Least Privilege Patch Management Respond Advanced Persistent Threat Vishing Spear Phishing Asset Management Data Discovery Malware Antivirus Whaling spearphishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero Day
Types of Hackers
Recover
smishing
Two-Factor Authentication
SSL Decrypt
Protect
PassPhase
Detect
Firewall
Secure Email
Phishing
Secure Password
Security Awareness Training
Identify
VPN
Risk Assessment
Least Privilege
Patch Management
Respond
Advanced Persistent Threat
Vishing
Spear Phishing
Asset Management
Data Discovery
Malware
Antivirus
Whaling
spearphishing