AccessContolPolicyRemoteDesktopMostrestrictivewinsReadEFSIDSEventViewerThenumber1010FullBackupInheritpermissionsThenumber1110SiteGroupPolicyWPA2BitlockerStatefulFirewallspywareShreddingManTrapFingerprintscannerSymmetricOrganizationalUnitDEPMFASMTPFullControlWriteHardeningThenumber0011SmartcardAUPLocalAccountMinimumPasswordAgeBackdoorLogoneventsComplexitygpupdate/forceDictionaryAttackdirWhitelistingLocalGroupPolicyexFATDomainGroupPolicyIncrementalProgramFilesUsersHashingAccountlogoneventsSFTPRead &ExecuteadwarewormWSUSStenography22RADIUSDMZIPSNATUsername&password25ModifyRetainpermissionsvirus2190minutesActiveDirectoryDNSWEPBlacklistingAsymmetricDifferentialsfc/scannowTPM80cd443StatelessfirewallTrojanhorseSystemeventsDHCPServerLeastrestrictivewinsIPSecAccessContolPolicyRemoteDesktopMostrestrictivewinsReadEFSIDSEventViewerThenumber1010FullBackupInheritpermissionsThenumber1110SiteGroupPolicyWPA2BitlockerStatefulFirewallspywareShreddingManTrapFingerprintscannerSymmetricOrganizationalUnitDEPMFASMTPFullControlWriteHardeningThenumber0011SmartcardAUPLocalAccountMinimumPasswordAgeBackdoorLogoneventsComplexitygpupdate/forceDictionaryAttackdirWhitelistingLocalGroupPolicyexFATDomainGroupPolicyIncrementalProgramFilesUsersHashingAccountlogoneventsSFTPRead &ExecuteadwarewormWSUSStenography22RADIUSDMZIPSNATUsername&password25ModifyRetainpermissionsvirus2190minutesActiveDirectoryDNSWEPBlacklistingAsymmetricDifferentialsfc/scannowTPM80cd443StatelessfirewallTrojanhorseSystemeventsDHCPServerLeastrestrictivewinsIPSec

Cybersecurity - Review - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Access Contol Policy
  2. Remote Desktop
  3. Most restrictive wins
  4. Read
  5. EFS
  6. IDS
  7. Event Viewer
  8. The number 1010
  9. Full Backup
  10. Inherit permissions
  11. The number 1110
  12. Site Group Policy
  13. WPA2
  14. Bitlocker
  15. Stateful Firewall
  16. spyware
  17. Shredding
  18. Man Trap
  19. Fingerprint scanner
  20. Symmetric
  21. Organizational Unit
  22. DEP
  23. MFA
  24. SMTP
  25. Full Control
  26. Write
  27. Hardening
  28. The number 0011
  29. Smart card
  30. AUP
  31. Local Account
  32. Minimum Password Age
  33. Backdoor
  34. Logon events
  35. Complexity
  36. gpupdate /force
  37. Dictionary Attack
  38. dir
  39. Whitelisting
  40. Local Group Policy
  41. exFAT
  42. Domain Group Policy
  43. Incremental
  44. Program Files
  45. Users
  46. Hashing
  47. Account logon events
  48. SFTP
  49. Read & Execute
  50. adware
  51. worm
  52. WSUS
  53. Stenography
  54. 22
  55. RADIUS
  56. DMZ
  57. IPS
  58. NAT
  59. Username & password
  60. 25
  61. Modify
  62. Retain permissions
  63. virus
  64. 21
  65. 90 minutes
  66. Active Directory
  67. DNS
  68. WEP
  69. Blacklisting
  70. Asymmetric
  71. Differential
  72. sfc /scannow
  73. TPM
  74. 80
  75. cd
  76. 443
  77. Stateless firewall
  78. Trojan horse
  79. System events
  80. DHCP Server
  81. Least restrictive wins
  82. IPSec