Disruption-ChaosAttacksRevengeAttacksShadowITFinancialGainAttacksScriptKiddieThreatIntelligenceNation-StateAttackersTTPsDataExfiltrationAttacksBlackmailAttacksPredictiveAnalysisHacktivistsThreatMapsBlack-HatHackersServiceDisruptionAttacksZero-DayAttacksAttackSurfacesThreatVectorsDarkWebIoCsCorporateEspionageISACsVulnerabilityDatabasesClosed-SourceIntelligenceInsiderThreatFree!OrganizedCrimeAttackersEspionageAttacksSTIXGray-HatHackersWarAttacksThreatActorsAPTsEthicalAttacksOSINTWhite-HatHackersPhilosophical-Political BeliefAttacksDisruption-ChaosAttacksRevengeAttacksShadowITFinancialGainAttacksScriptKiddieThreatIntelligenceNation-StateAttackersTTPsDataExfiltrationAttacksBlackmailAttacksPredictiveAnalysisHacktivistsThreatMapsBlack-HatHackersServiceDisruptionAttacksZero-DayAttacksAttackSurfacesThreatVectorsDarkWebIoCsCorporateEspionageISACsVulnerabilityDatabasesClosed-SourceIntelligenceInsiderThreatFree!OrganizedCrimeAttackersEspionageAttacksSTIXGray-HatHackersWarAttacksThreatActorsAPTsEthicalAttacksOSINTWhite-HatHackersPhilosophical-Political BeliefAttacks

CHAPTER 2 SEC+ - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. Disruption-Chaos Attacks
  2. Revenge Attacks
  3. Shadow IT
  4. Financial Gain Attacks
  5. Script Kiddie
  6. Threat Intelligence
  7. Nation-State Attackers
  8. TTPs
  9. Data Exfiltration Attacks
  10. Blackmail Attacks
  11. Predictive Analysis
  12. Hacktivists
  13. Threat Maps
  14. Black-Hat Hackers
  15. Service Disruption Attacks
  16. Zero-Day Attacks
  17. Attack Surfaces
  18. Threat Vectors
  19. Dark Web
  20. IoCs
  21. Corporate Espionage
  22. ISACs
  23. Vulnerability Databases
  24. Closed-Source Intelligence
  25. Insider Threat
  26. Free!
  27. Organized Crime Attackers
  28. Espionage Attacks
  29. STIX
  30. Gray-Hat Hackers
  31. War Attacks
  32. Threat Actors
  33. APTs
  34. Ethical Attacks
  35. OSINT
  36. White-Hat Hackers
  37. Philosophical-Political Belief Attacks