NetworksdatalockoutdataprivacyApplicationSecurityWormvulnerabilityThreatSensitivecompromiseInformationSecuritycookiesAuthorizationVirusAccessControlPolicyMFAScamPrivacy12charactersTrojanStandardsPretextingpaymentgatewayconfidentialThreatLandscape80/20PIIPolicycriticalfilesSocialMediaScamsOWASPAuthenticationbackupAccessControlProceduresInternalUserestrictedRansomwaresecuritySLASmishingPhishingSDLCVulnerabilityserverserverPasswordinformationclassificationstandardsAuditGDPRinformationsystemspaymentoptionBreachVishingSpearPhishingSocialEngineeringRiskdigitaldatadatasecurityBYODPhishingdatabaseCybersecurityLandscapesecurityawarenessDPAGuidelinesaccountabilitycomplianceNetworksdatalockoutdataprivacyApplicationSecurityWormvulnerabilityThreatSensitivecompromiseInformationSecuritycookiesAuthorizationVirusAccessControlPolicyMFAScamPrivacy12charactersTrojanStandardsPretextingpaymentgatewayconfidentialThreatLandscape80/20PIIPolicycriticalfilesSocialMediaScamsOWASPAuthenticationbackupAccessControlProceduresInternalUserestrictedRansomwaresecuritySLASmishingPhishingSDLCVulnerabilityserverserverPasswordinformationclassificationstandardsAuditGDPRinformationsystemspaymentoptionBreachVishingSpearPhishingSocialEngineeringRiskdigitaldatadatasecurityBYODPhishingdatabaseCybersecurityLandscapesecurityawarenessDPAGuidelinesaccountabilitycompliance

APN SAT 2024 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
  1. Networks
  2. data
  3. lockout
  4. data privacy
  5. Application Security
  6. Worm
  7. vulnerability
  8. Threat
  9. Sensitive
  10. compromise
  11. Information Security
  12. cookies
  13. Authorization
  14. Virus
  15. Access Control Policy
  16. MFA
  17. Scam
  18. Privacy
  19. 12 characters
  20. Trojan
  21. Standards
  22. Pretexting
  23. payment gateway
  24. confidential
  25. Threat Landscape
  26. 80/20
  27. PII
  28. Policy
  29. critical files
  30. Social Media Scams
  31. OWASP
  32. Authentication
  33. backup
  34. Access Control
  35. Procedures
  36. Internal Use
  37. restricted
  38. Ransomware
  39. security
  40. SLA
  41. Smishing
  42. Phishing
  43. SDLC
  44. Vulnerability
  45. server
  46. server
  47. Password
  48. information classification standards
  49. Audit
  50. GDPR
  51. information systems
  52. payment option
  53. Breach
  54. Vishing
  55. Spear Phishing
  56. Social Engineering
  57. Risk
  58. digital data
  59. data security
  60. BYOD
  61. Phishing
  62. database
  63. Cybersecurity Landscape
  64. security awareness
  65. DPA
  66. Guidelines
  67. accountability
  68. compliance