AsymmetricDHCPServerLocalGroupPolicySFTPFullBackupLeastrestrictivewinsUsername&passwordsfc/scannowHardeningInheritpermissionsStatefulFirewall80ProgramFilesBitlockerspywareManTrapEventViewerRemoteDesktop22MFAShreddingDictionaryAttackDifferential25ComplexityThenumber0011LocalAccountBackdoorSymmetricvirusSystemeventsBlacklistingIPSMostrestrictivewinsadwareStatelessfirewallRetainpermissionsThenumber1110exFATThenumber1010SiteGroupPolicyLogoneventsRead &ExecuteNATSMTP443EFSAUP90minutesReaddirTrojanhorsegpupdate/forceWSUSRADIUSDMZ21ActiveDirectoryIPSecStenographyFingerprintscannerDEPFullControlDNSWEPwormMinimumPasswordAgeIDSUsersModifyWriteIncrementalOrganizationalUnitTPMAccountlogoneventsSmartcardWPA2HashingWhitelistingDomainGroupPolicycdAccessContolPolicyAsymmetricDHCPServerLocalGroupPolicySFTPFullBackupLeastrestrictivewinsUsername&passwordsfc/scannowHardeningInheritpermissionsStatefulFirewall80ProgramFilesBitlockerspywareManTrapEventViewerRemoteDesktop22MFAShreddingDictionaryAttackDifferential25ComplexityThenumber0011LocalAccountBackdoorSymmetricvirusSystemeventsBlacklistingIPSMostrestrictivewinsadwareStatelessfirewallRetainpermissionsThenumber1110exFATThenumber1010SiteGroupPolicyLogoneventsRead &ExecuteNATSMTP443EFSAUP90minutesReaddirTrojanhorsegpupdate/forceWSUSRADIUSDMZ21ActiveDirectoryIPSecStenographyFingerprintscannerDEPFullControlDNSWEPwormMinimumPasswordAgeIDSUsersModifyWriteIncrementalOrganizationalUnitTPMAccountlogoneventsSmartcardWPA2HashingWhitelistingDomainGroupPolicycdAccessContolPolicy

Cybersecurity - Review - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Asymmetric
  2. DHCP Server
  3. Local Group Policy
  4. SFTP
  5. Full Backup
  6. Least restrictive wins
  7. Username & password
  8. sfc /scannow
  9. Hardening
  10. Inherit permissions
  11. Stateful Firewall
  12. 80
  13. Program Files
  14. Bitlocker
  15. spyware
  16. Man Trap
  17. Event Viewer
  18. Remote Desktop
  19. 22
  20. MFA
  21. Shredding
  22. Dictionary Attack
  23. Differential
  24. 25
  25. Complexity
  26. The number 0011
  27. Local Account
  28. Backdoor
  29. Symmetric
  30. virus
  31. System events
  32. Blacklisting
  33. IPS
  34. Most restrictive wins
  35. adware
  36. Stateless firewall
  37. Retain permissions
  38. The number 1110
  39. exFAT
  40. The number 1010
  41. Site Group Policy
  42. Logon events
  43. Read & Execute
  44. NAT
  45. SMTP
  46. 443
  47. EFS
  48. AUP
  49. 90 minutes
  50. Read
  51. dir
  52. Trojan horse
  53. gpupdate /force
  54. WSUS
  55. RADIUS
  56. DMZ
  57. 21
  58. Active Directory
  59. IPSec
  60. Stenography
  61. Fingerprint scanner
  62. DEP
  63. Full Control
  64. DNS
  65. WEP
  66. worm
  67. Minimum Password Age
  68. IDS
  69. Users
  70. Modify
  71. Write
  72. Incremental
  73. Organizational Unit
  74. TPM
  75. Account logon events
  76. Smart card
  77. WPA2
  78. Hashing
  79. Whitelisting
  80. Domain Group Policy
  81. cd
  82. Access Contol Policy