DDoS(DistributedDenial ofService)CryptographyRansomwareHoneypotBiometricAuthenticationAntivirusRootkitCybersecurityFrameworkNIST (NationalInstitute ofStandards andTechnology)PacketSniffingSocialEngineeringPatchMan-in-the-Middle(MitM)AttackZero-dayExploitCyberThreatIntelligenceIntrusionDetectionSystem(IDS)MalwareTwo-factorAuthentication(2FA)PhishingPenetrationTestingWhiteHatHackerIncidentResponseTokenizationAccessControlSIEM(SecurityInformationand EventManagement)BlackHatHackerVPN(VirtualPrivateNetwork)FirewallEndpointSecurityEncryptionDDoS(DistributedDenial ofService)CryptographyRansomwareHoneypotBiometricAuthenticationAntivirusRootkitCybersecurityFrameworkNIST (NationalInstitute ofStandards andTechnology)PacketSniffingSocialEngineeringPatchMan-in-the-Middle(MitM)AttackZero-dayExploitCyberThreatIntelligenceIntrusionDetectionSystem(IDS)MalwareTwo-factorAuthentication(2FA)PhishingPenetrationTestingWhiteHatHackerIncidentResponseTokenizationAccessControlSIEM(SecurityInformationand EventManagement)BlackHatHackerVPN(VirtualPrivateNetwork)FirewallEndpointSecurityEncryption

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
  1. DDoS (Distributed Denial of Service)
  2. Cryptography
  3. Ransomware
  4. Honeypot
  5. Biometric Authentication
  6. Antivirus
  7. Rootkit
  8. Cybersecurity Framework
  9. NIST (National Institute of Standards and Technology)
  10. Packet Sniffing
  11. Social Engineering
  12. Patch
  13. Man-in-the-Middle (MitM) Attack
  14. Zero-day Exploit
  15. Cyber Threat Intelligence
  16. Intrusion Detection System (IDS)
  17. Malware
  18. Two-factor Authentication (2FA)
  19. Phishing
  20. Penetration Testing
  21. White Hat Hacker
  22. Incident Response
  23. Tokenization
  24. Access Control
  25. SIEM (Security Information and Event Management)
  26. Black Hat Hacker
  27. VPN (Virtual Private Network)
  28. Firewall
  29. Endpoint Security
  30. Encryption