DigitalFootprintIPAddressEthicalHackerTwo-FactorAuthInsiderThreatVPN(VirtualPrivateNetwork)CyberHygieneOperatingSystemSocialEngineeringFirewallClientProxyMulti-FactorAuthentication(MFA)Wi-FiWAN(WideAreaNetwork)BackupCommandLinePasswordPortNumberDNS(DomainNameSystem)PingNetworkCableDataBreachTrojanHorsePacketMalwareRansomwareUpdate/ PatchLAN(LocalAreaNetwork)EthernetFirewallRuleRouterCloudZeroTrustPhishingServerSwitchAntivirusStrongPasswordEncryptionDigitalFootprintIPAddressEthicalHackerTwo-FactorAuthInsiderThreatVPN(VirtualPrivateNetwork)CyberHygieneOperatingSystemSocialEngineeringFirewallClientProxyMulti-FactorAuthentication(MFA)Wi-FiWAN(WideAreaNetwork)BackupCommandLinePasswordPortNumberDNS(DomainNameSystem)PingNetworkCableDataBreachTrojanHorsePacketMalwareRansomwareUpdate/ PatchLAN(LocalAreaNetwork)EthernetFirewallRuleRouterCloudZeroTrustPhishingServerSwitchAntivirusStrongPasswordEncryption

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Digital Footprint
  2. IP Address
  3. Ethical Hacker
  4. Two-Factor Auth
  5. Insider Threat
  6. VPN (Virtual Private Network)
  7. Cyber Hygiene
  8. Operating System
  9. Social Engineering
  10. Firewall
  11. Client
  12. Proxy
  13. Multi-Factor Authentication (MFA)
  14. Wi-Fi
  15. WAN (Wide Area Network)
  16. Backup
  17. Command Line
  18. Password
  19. Port Number
  20. DNS (Domain Name System)
  21. Ping
  22. Network Cable
  23. Data Breach
  24. Trojan Horse
  25. Packet
  26. Malware
  27. Ransomware
  28. Update / Patch
  29. LAN (Local Area Network)
  30. Ethernet
  31. Firewall Rule
  32. Router
  33. Cloud
  34. Zero Trust
  35. Phishing
  36. Server
  37. Switch
  38. Antivirus
  39. Strong Password
  40. Encryption