Zero Trust Multi-Factor Authentication (MFA) Malware Insider Threat Firewall Rule DNS (Domain Name System) IP Address VPN (Virtual Private Network) Ping Command Line Strong Password Port Number Firewall Router Antivirus Cloud Wi- Fi Proxy Two- Factor Auth LAN (Local Area Network) Backup WAN (Wide Area Network) Client Data Breach Packet Phishing Social Engineering Ethernet Server Trojan Horse Password Digital Footprint Encryption Operating System Cyber Hygiene Update / Patch Ethical Hacker Switch Ransomware Network Cable Zero Trust Multi-Factor Authentication (MFA) Malware Insider Threat Firewall Rule DNS (Domain Name System) IP Address VPN (Virtual Private Network) Ping Command Line Strong Password Port Number Firewall Router Antivirus Cloud Wi- Fi Proxy Two- Factor Auth LAN (Local Area Network) Backup WAN (Wide Area Network) Client Data Breach Packet Phishing Social Engineering Ethernet Server Trojan Horse Password Digital Footprint Encryption Operating System Cyber Hygiene Update / Patch Ethical Hacker Switch Ransomware Network Cable
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Zero Trust
Multi-Factor Authentication (MFA)
Malware
Insider Threat
Firewall Rule
DNS (Domain Name System)
IP Address
VPN (Virtual Private Network)
Ping
Command Line
Strong Password
Port Number
Firewall
Router
Antivirus
Cloud
Wi-Fi
Proxy
Two-Factor Auth
LAN (Local Area Network)
Backup
WAN (Wide Area Network)
Client
Data Breach
Packet
Phishing
Social Engineering
Ethernet
Server
Trojan Horse
Password
Digital Footprint
Encryption
Operating System
Cyber Hygiene
Update / Patch
Ethical Hacker
Switch
Ransomware
Network Cable