Vulnerability Domain Black Hat Dark Web Unix Phishing AI Encryption Bot Patch Breach White Hat Main Frame Exploit Bug Cyber Hacking (as a verb) Data Logs Cloud Machine Learning Gbps 1337 VPN Zero- Day Linux Spoofing Extortion Penetration admin End- User Chinese Legacy Nuclear Spam Trojan Keylogger Anonymous Intelligence IP Tracker Social Media Malware Virus Brute force Ransom- ware Root Cyber attack Binary Script Next- Gen Vulnerability Domain Black Hat Dark Web Unix Phishing AI Encryption Bot Patch Breach White Hat Main Frame Exploit Bug Cyber Hacking (as a verb) Data Logs Cloud Machine Learning Gbps 1337 VPN Zero- Day Linux Spoofing Extortion Penetration admin End- User Chinese Legacy Nuclear Spam Trojan Keylogger Anonymous Intelligence IP Tracker Social Media Malware Virus Brute force Ransom- ware Root Cyber attack Binary Script Next- Gen
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vulnerability
Domain
Black Hat
Dark Web
Unix
Phishing
AI
Encryption
Bot
Patch
Breach
White Hat
Main Frame
Exploit
Bug
Cyber
Hacking (as a verb)
Data Logs
Cloud
Machine Learning
Gbps
1337
VPN
Zero-Day
Linux
Spoofing
Extortion
Penetration
admin
End-User
Chinese
Legacy
Nuclear
Spam
Trojan
Keylogger
Anonymous
Intelligence
IP Tracker
Social Media
Malware
Virus
Brute force
Ransom-ware
Root
Cyber attack
Binary Script
Next-Gen