SocialEngineeringOWASPbackupAccessControldatabase80/20CybersecurityLandscapeSLAPrivacydigitaldataPasswordTrojanpaymentoptionWormPhishingAccessControlPolicyserverAuditAuthenticationBYODcriticalfilescookiessecurityProcedurescompromisePretextingdatalockout12charactersconfidentialvulnerabilityStandardspaymentgatewaysecurityawarenessinformationclassificationstandardsThreatDPARansomwareGuidelinesVirusVulnerabilityInformationSecurityVishingGDPRdataprivacyThreatLandscapeApplicationSecuritySpearPhishingRiskinformationsystemsNetworksBreachcompliancedatasecurityAuthorizationSensitivePhishingMFAPolicyInternalUserestrictedSocialMediaScamsaccountabilityserverSmishingSDLCPIIScamSocialEngineeringOWASPbackupAccessControldatabase80/20CybersecurityLandscapeSLAPrivacydigitaldataPasswordTrojanpaymentoptionWormPhishingAccessControlPolicyserverAuditAuthenticationBYODcriticalfilescookiessecurityProcedurescompromisePretextingdatalockout12charactersconfidentialvulnerabilityStandardspaymentgatewaysecurityawarenessinformationclassificationstandardsThreatDPARansomwareGuidelinesVirusVulnerabilityInformationSecurityVishingGDPRdataprivacyThreatLandscapeApplicationSecuritySpearPhishingRiskinformationsystemsNetworksBreachcompliancedatasecurityAuthorizationSensitivePhishingMFAPolicyInternalUserestrictedSocialMediaScamsaccountabilityserverSmishingSDLCPIIScam

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Social Engineering
  2. OWASP
  3. backup
  4. Access Control
  5. database
  6. 80/20
  7. Cybersecurity Landscape
  8. SLA
  9. Privacy
  10. digital data
  11. Password
  12. Trojan
  13. payment option
  14. Worm
  15. Phishing
  16. Access Control Policy
  17. server
  18. Audit
  19. Authentication
  20. BYOD
  21. critical files
  22. cookies
  23. security
  24. Procedures
  25. compromise
  26. Pretexting
  27. data
  28. lockout
  29. 12 characters
  30. confidential
  31. vulnerability
  32. Standards
  33. payment gateway
  34. security awareness
  35. information classification standards
  36. Threat
  37. DPA
  38. Ransomware
  39. Guidelines
  40. Virus
  41. Vulnerability
  42. Information Security
  43. Vishing
  44. GDPR
  45. data privacy
  46. Threat Landscape
  47. Application Security
  48. Spear Phishing
  49. Risk
  50. information systems
  51. Networks
  52. Breach
  53. compliance
  54. data security
  55. Authorization
  56. Sensitive
  57. Phishing
  58. MFA
  59. Policy
  60. Internal Use
  61. restricted
  62. Social Media Scams
  63. accountability
  64. server
  65. Smishing
  66. SDLC
  67. PII
  68. Scam