BackupandrecoveryPhishingBlackhathackerPasswordsSocialengineeringEncryptionAnti-virusExternalthreatsDisruptionPentestingModernteamsCyberattackWhitehathackerFinancialgainBiometricsPoliciesIndustrialespionageMalwareSoftware/interfacedesignMan inthemiddleFirewallUnauthorisedaccessInternalthreatsDecryptionDenialofserviceGreyhathackerCloudcomputingDowntimeBYODCloudstorage2FARansomwareattackShouldersurfingDevicehardeningPharmingDisasterrecoveryBackupandrecoveryPhishingBlackhathackerPasswordsSocialengineeringEncryptionAnti-virusExternalthreatsDisruptionPentestingModernteamsCyberattackWhitehathackerFinancialgainBiometricsPoliciesIndustrialespionageMalwareSoftware/interfacedesignMan inthemiddleFirewallUnauthorisedaccessInternalthreatsDecryptionDenialofserviceGreyhathackerCloudcomputingDowntimeBYODCloudstorage2FARansomwareattackShouldersurfingDevicehardeningPharmingDisasterrecovery

Definition Bingo! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
  1. Backup and recovery
  2. Phishing
  3. Black hat hacker
  4. Passwords
  5. Social engineering
  6. Encryption
  7. Anti-virus
  8. External threats
  9. Disruption
  10. Pen testing
  11. Modern teams
  12. Cyber attack
  13. White hat hacker
  14. Financial gain
  15. Biometrics
  16. Policies
  17. Industrial espionage
  18. Malware
  19. Software/interface design
  20. Man in the middle
  21. Firewall
  22. Unauthorised access
  23. Internal threats
  24. Decryption
  25. Denial of service
  26. Grey hat hacker
  27. Cloud computing
  28. Downtime
  29. BYOD
  30. Cloud storage
  31. 2FA
  32. Ransomware attack
  33. Shoulder surfing
  34. Device hardening
  35. Pharming
  36. Disaster recovery