IP Address Hacker Anti- Virus Ransomware Malware Internet of Things Network Data Dictionary Attack Spoofing Password Phishing Spoofing Dictionary Attack Password Social Engineering Device DDos Personal Information Vulnerability Social Engineering Network Data SPAM Brute Force Brute Force Personal Information e- mail Drive-by Downloads Trojan Horse Phishing Trojan Horse Drive-by Downloads Device Attack DDos Ransomware Attack Malware Internet of Things Password Cryptojacking Cryptojacking IP Address Hacker Anti- Virus Ransomware Malware Internet of Things Network Data Dictionary Attack Spoofing Password Phishing Spoofing Dictionary Attack Password Social Engineering Device DDos Personal Information Vulnerability Social Engineering Network Data SPAM Brute Force Brute Force Personal Information e- mail Drive-by Downloads Trojan Horse Phishing Trojan Horse Drive-by Downloads Device Attack DDos Ransomware Attack Malware Internet of Things Password Cryptojacking Cryptojacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IP Address
Hacker
Anti-Virus
Ransomware
Malware
Internet of Things
Network
Data
Dictionary Attack
Spoofing
Password
Phishing
Spoofing
Dictionary Attack
Password
Social Engineering
Device
DDos
Personal Information
Vulnerability
Social Engineering
Network
Data
SPAM
Brute Force
Brute Force
Personal Information
e-mail
Drive-by Downloads
Trojan Horse
Phishing
Trojan Horse
Drive-by Downloads
Device
Attack
DDos
Ransomware
Attack
Malware
Internet of Things
Password
Cryptojacking
Cryptojacking