DNS (Domain Name System) Backup Multi-Factor Authentication (MFA) Packet Switch Proxy Strong Password Two- Factor Auth Wi- Fi Cloud Malware Digital Footprint Command Line Ethical Hacker Server IP Address Ransomware Antivirus Data Breach Operating System Encryption WAN (Wide Area Network) Firewall Rule Insider Threat Social Engineering Network Cable Password Phishing Cyber Hygiene Ethernet Zero Trust Router LAN (Local Area Network) Firewall VPN (Virtual Private Network) Trojan Horse Client Ping Port Number Update / Patch DNS (Domain Name System) Backup Multi-Factor Authentication (MFA) Packet Switch Proxy Strong Password Two- Factor Auth Wi- Fi Cloud Malware Digital Footprint Command Line Ethical Hacker Server IP Address Ransomware Antivirus Data Breach Operating System Encryption WAN (Wide Area Network) Firewall Rule Insider Threat Social Engineering Network Cable Password Phishing Cyber Hygiene Ethernet Zero Trust Router LAN (Local Area Network) Firewall VPN (Virtual Private Network) Trojan Horse Client Ping Port Number Update / Patch
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DNS (Domain Name System)
Backup
Multi-Factor Authentication (MFA)
Packet
Switch
Proxy
Strong Password
Two-Factor Auth
Wi-Fi
Cloud
Malware
Digital Footprint
Command Line
Ethical Hacker
Server
IP Address
Ransomware
Antivirus
Data Breach
Operating System
Encryption
WAN (Wide Area Network)
Firewall Rule
Insider Threat
Social Engineering
Network Cable
Password
Phishing
Cyber Hygiene
Ethernet
Zero Trust
Router
LAN (Local Area Network)
Firewall
VPN (Virtual Private Network)
Trojan Horse
Client
Ping
Port Number
Update / Patch