BlacklistingRead &ExecuteThenumber1110IPSecActiveDirectoryDifferentialOrganizationalUnitMinimumPasswordAgeWriteadwareHashing21IPSBackdoorFullBackupUsersMFAexFATspywareNATStatelessfirewallInheritpermissionsDHCPServerSymmetricWhitelistingManTrapTrojanhorseThenumber1010DMZWSUSComplexityLeastrestrictivewinsIncrementalgpupdate/force22WEPLocalAccountdirWPA2FingerprintscannerShreddingSystemeventsDNSRetainpermissionsAUPcdTPMSmartcardEFSRADIUSModifyHardeningThenumber0011ProgramFilesFullControlDEPEventViewerSFTP90minutesLocalGroupPolicysfc/scannowDomainGroupPolicyReadSiteGroupPolicy80AsymmetricBitlockerRemoteDesktopStatefulFirewallDictionaryAttackLogonevents25MostrestrictivewinsvirusUsername&passwordAccessContolPolicyStenography443SMTPAccountlogoneventswormIDSBlacklistingRead &ExecuteThenumber1110IPSecActiveDirectoryDifferentialOrganizationalUnitMinimumPasswordAgeWriteadwareHashing21IPSBackdoorFullBackupUsersMFAexFATspywareNATStatelessfirewallInheritpermissionsDHCPServerSymmetricWhitelistingManTrapTrojanhorseThenumber1010DMZWSUSComplexityLeastrestrictivewinsIncrementalgpupdate/force22WEPLocalAccountdirWPA2FingerprintscannerShreddingSystemeventsDNSRetainpermissionsAUPcdTPMSmartcardEFSRADIUSModifyHardeningThenumber0011ProgramFilesFullControlDEPEventViewerSFTP90minutesLocalGroupPolicysfc/scannowDomainGroupPolicyReadSiteGroupPolicy80AsymmetricBitlockerRemoteDesktopStatefulFirewallDictionaryAttackLogonevents25MostrestrictivewinsvirusUsername&passwordAccessContolPolicyStenography443SMTPAccountlogoneventswormIDS

Cybersecurity - Review - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  1. Blacklisting
  2. Read & Execute
  3. The number 1110
  4. IPSec
  5. Active Directory
  6. Differential
  7. Organizational Unit
  8. Minimum Password Age
  9. Write
  10. adware
  11. Hashing
  12. 21
  13. IPS
  14. Backdoor
  15. Full Backup
  16. Users
  17. MFA
  18. exFAT
  19. spyware
  20. NAT
  21. Stateless firewall
  22. Inherit permissions
  23. DHCP Server
  24. Symmetric
  25. Whitelisting
  26. Man Trap
  27. Trojan horse
  28. The number 1010
  29. DMZ
  30. WSUS
  31. Complexity
  32. Least restrictive wins
  33. Incremental
  34. gpupdate /force
  35. 22
  36. WEP
  37. Local Account
  38. dir
  39. WPA2
  40. Fingerprint scanner
  41. Shredding
  42. System events
  43. DNS
  44. Retain permissions
  45. AUP
  46. cd
  47. TPM
  48. Smart card
  49. EFS
  50. RADIUS
  51. Modify
  52. Hardening
  53. The number 0011
  54. Program Files
  55. Full Control
  56. DEP
  57. Event Viewer
  58. SFTP
  59. 90 minutes
  60. Local Group Policy
  61. sfc /scannow
  62. Domain Group Policy
  63. Read
  64. Site Group Policy
  65. 80
  66. Asymmetric
  67. Bitlocker
  68. Remote Desktop
  69. Stateful Firewall
  70. Dictionary Attack
  71. Logon events
  72. 25
  73. Most restrictive wins
  74. virus
  75. Username & password
  76. Access Contol Policy
  77. Stenography
  78. 443
  79. SMTP
  80. Account logon events
  81. worm
  82. IDS