Linux Main Frame Trojan Binary Script Virus Exploit Next- Gen Cyber Black Hat Malware Social Media Keylogger Cyber attack Encryption Extortion Intelligence Legacy Gbps Brute force Machine Learning Patch Root Cloud Bot Chinese Breach Bug Ransom- ware Vulnerability VPN Hacking (as a verb) AI White Hat Anonymous End- User 1337 Unix Spoofing Zero- Day Penetration admin Domain Data Logs Dark Web Spam IP Tracker Phishing Nuclear Linux Main Frame Trojan Binary Script Virus Exploit Next- Gen Cyber Black Hat Malware Social Media Keylogger Cyber attack Encryption Extortion Intelligence Legacy Gbps Brute force Machine Learning Patch Root Cloud Bot Chinese Breach Bug Ransom- ware Vulnerability VPN Hacking (as a verb) AI White Hat Anonymous End- User 1337 Unix Spoofing Zero- Day Penetration admin Domain Data Logs Dark Web Spam IP Tracker Phishing Nuclear
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Linux
Main Frame
Trojan
Binary Script
Virus
Exploit
Next-Gen
Cyber
Black Hat
Malware
Social Media
Keylogger
Cyber attack
Encryption
Extortion
Intelligence
Legacy
Gbps
Brute force
Machine Learning
Patch
Root
Cloud
Bot
Chinese
Breach
Bug
Ransom-ware
Vulnerability
VPN
Hacking (as a verb)
AI
White Hat
Anonymous
End-User
1337
Unix
Spoofing
Zero-Day
Penetration
admin
Domain
Data Logs
Dark Web
Spam
IP Tracker
Phishing
Nuclear