DMZSmartcardReadStenographyEventViewerRead &ExecuteMinimumPasswordAgeadwareexFATWEPBackdoorDomainGroupPolicyInheritpermissionsAUPSFTPFullBackupwormHashingActiveDirectoryLocalAccountWSUSIncrementalTrojanhorseEFSThenumber0011cdDictionaryAttack25RetainpermissionsOrganizationalUnitUsersBlacklistingFullControlSMTPComplexityIPSLocalGroupPolicySystemeventsShreddingRADIUSStatelessfirewallManTrapAccessContolPolicyMFAgpupdate/forcedir21SiteGroupPolicyDNSProgramFilesSymmetricWPA2RemoteDesktopTPMModify80IPSecWhitelisting90minutesvirusDHCPServer22Thenumber1110LogoneventsspywareUsername&passwordFingerprintscannerHardeningAsymmetricWriteDifferentialIDSBitlockerLeastrestrictivewinsNATsfc/scannowAccountlogoneventsDEPThenumber1010443MostrestrictivewinsStatefulFirewallDMZSmartcardReadStenographyEventViewerRead &ExecuteMinimumPasswordAgeadwareexFATWEPBackdoorDomainGroupPolicyInheritpermissionsAUPSFTPFullBackupwormHashingActiveDirectoryLocalAccountWSUSIncrementalTrojanhorseEFSThenumber0011cdDictionaryAttack25RetainpermissionsOrganizationalUnitUsersBlacklistingFullControlSMTPComplexityIPSLocalGroupPolicySystemeventsShreddingRADIUSStatelessfirewallManTrapAccessContolPolicyMFAgpupdate/forcedir21SiteGroupPolicyDNSProgramFilesSymmetricWPA2RemoteDesktopTPMModify80IPSecWhitelisting90minutesvirusDHCPServer22Thenumber1110LogoneventsspywareUsername&passwordFingerprintscannerHardeningAsymmetricWriteDifferentialIDSBitlockerLeastrestrictivewinsNATsfc/scannowAccountlogoneventsDEPThenumber1010443MostrestrictivewinsStatefulFirewall

Cybersecurity - Review - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. DMZ
  2. Smart card
  3. Read
  4. Stenography
  5. Event Viewer
  6. Read & Execute
  7. Minimum Password Age
  8. adware
  9. exFAT
  10. WEP
  11. Backdoor
  12. Domain Group Policy
  13. Inherit permissions
  14. AUP
  15. SFTP
  16. Full Backup
  17. worm
  18. Hashing
  19. Active Directory
  20. Local Account
  21. WSUS
  22. Incremental
  23. Trojan horse
  24. EFS
  25. The number 0011
  26. cd
  27. Dictionary Attack
  28. 25
  29. Retain permissions
  30. Organizational Unit
  31. Users
  32. Blacklisting
  33. Full Control
  34. SMTP
  35. Complexity
  36. IPS
  37. Local Group Policy
  38. System events
  39. Shredding
  40. RADIUS
  41. Stateless firewall
  42. Man Trap
  43. Access Contol Policy
  44. MFA
  45. gpupdate /force
  46. dir
  47. 21
  48. Site Group Policy
  49. DNS
  50. Program Files
  51. Symmetric
  52. WPA2
  53. Remote Desktop
  54. TPM
  55. Modify
  56. 80
  57. IPSec
  58. Whitelisting
  59. 90 minutes
  60. virus
  61. DHCP Server
  62. 22
  63. The number 1110
  64. Logon events
  65. spyware
  66. Username & password
  67. Fingerprint scanner
  68. Hardening
  69. Asymmetric
  70. Write
  71. Differential
  72. IDS
  73. Bitlocker
  74. Least restrictive wins
  75. NAT
  76. sfc /scannow
  77. Account logon events
  78. DEP
  79. The number 1010
  80. 443
  81. Most restrictive wins
  82. Stateful Firewall