Linux Emulation Encryption Hard Stop Value Add Offensive Action Item Kernel Embedded Device Best Practice Modem Alignment PowerPC (PPC) Full Disclosure Scalable Next Slide Please Synergy Cyber Bullet Terminal Buy- In Deep Dive Results Driven Circle Back Code Execution Malware Game Plan Follow Up Quantum Computing It's on my radar ARM The Ask x86 Agile 32- bit Leverage Touch Base 0- Day Buffer Overflow Take it Offline Strategic Linux Emulation Encryption Hard Stop Value Add Offensive Action Item Kernel Embedded Device Best Practice Modem Alignment PowerPC (PPC) Full Disclosure Scalable Next Slide Please Synergy Cyber Bullet Terminal Buy- In Deep Dive Results Driven Circle Back Code Execution Malware Game Plan Follow Up Quantum Computing It's on my radar ARM The Ask x86 Agile 32- bit Leverage Touch Base 0- Day Buffer Overflow Take it Offline Strategic
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Linux
Emulation
Encryption
Hard Stop
Value Add
Offensive
Action Item
Kernel
Embedded Device
Best Practice
Modem
Alignment
PowerPC (PPC)
Full Disclosure
Scalable
Next Slide Please
Synergy
Cyber Bullet
Terminal
Buy-In
Deep Dive
Results Driven
Circle Back
Code Execution
Malware
Game Plan
Follow Up
Quantum Computing
It's on my radar
ARM
The Ask
x86
Agile
32-bit
Leverage
Touch Base
0-Day
Buffer Overflow
Take it Offline
Strategic