LinuxMainFrameTrojanBinaryScriptVirusExploitNext-GenCyberBlackHatMalwareSocialMediaKeyloggerCyberattackEncryptionExtortionIntelligenceLegacyGbpsBruteforceMachineLearningPatchRootCloudBotChineseBreachBugRansom-wareVulnerabilityVPNHacking(as averb)AIWhiteHatAnonymousEnd-User1337UnixSpoofingZero-DayPenetrationadminDomainDataLogsDarkWebSpamIPTrackerPhishingNuclearLinuxMainFrameTrojanBinaryScriptVirusExploitNext-GenCyberBlackHatMalwareSocialMediaKeyloggerCyberattackEncryptionExtortionIntelligenceLegacyGbpsBruteforceMachineLearningPatchRootCloudBotChineseBreachBugRansom-wareVulnerabilityVPNHacking(as averb)AIWhiteHatAnonymousEnd-User1337UnixSpoofingZero-DayPenetrationadminDomainDataLogsDarkWebSpamIPTrackerPhishingNuclear

6969Boiiii!!!1!!1! Presents CSI:Cyber - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Linux
  2. Main Frame
  3. Trojan
  4. Binary Script
  5. Virus
  6. Exploit
  7. Next-Gen
  8. Cyber
  9. Black Hat
  10. Malware
  11. Social Media
  12. Keylogger
  13. Cyber attack
  14. Encryption
  15. Extortion
  16. Intelligence
  17. Legacy
  18. Gbps
  19. Brute force
  20. Machine Learning
  21. Patch
  22. Root
  23. Cloud
  24. Bot
  25. Chinese
  26. Breach
  27. Bug
  28. Ransom-ware
  29. Vulnerability
  30. VPN
  31. Hacking (as a verb)
  32. AI
  33. White Hat
  34. Anonymous
  35. End-User
  36. 1337
  37. Unix
  38. Spoofing
  39. Zero-Day
  40. Penetration
  41. admin
  42. Domain
  43. Data Logs
  44. Dark Web
  45. Spam
  46. IP Tracker
  47. Phishing
  48. Nuclear