TrojanHorsePingDataBreachRansomwareWAN(WideAreaNetwork)EncryptionInsiderThreatRouterMalwareCloudLAN(LocalAreaNetwork)PacketOperatingSystemDNS(DomainNameSystem)VPN(VirtualPrivateNetwork)AntivirusCyberHygieneZeroTrustServerNetworkCablePortNumberEthernetBackupDigitalFootprintPasswordClientProxySwitchStrongPasswordSocialEngineeringPhishingUpdate/ PatchMulti-FactorAuthentication(MFA)IPAddressTwo-FactorAuthFirewallEthicalHackerWi-FiCommandLineFirewallRuleTrojanHorsePingDataBreachRansomwareWAN(WideAreaNetwork)EncryptionInsiderThreatRouterMalwareCloudLAN(LocalAreaNetwork)PacketOperatingSystemDNS(DomainNameSystem)VPN(VirtualPrivateNetwork)AntivirusCyberHygieneZeroTrustServerNetworkCablePortNumberEthernetBackupDigitalFootprintPasswordClientProxySwitchStrongPasswordSocialEngineeringPhishingUpdate/ PatchMulti-FactorAuthentication(MFA)IPAddressTwo-FactorAuthFirewallEthicalHackerWi-FiCommandLineFirewallRule

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Trojan Horse
  2. Ping
  3. Data Breach
  4. Ransomware
  5. WAN (Wide Area Network)
  6. Encryption
  7. Insider Threat
  8. Router
  9. Malware
  10. Cloud
  11. LAN (Local Area Network)
  12. Packet
  13. Operating System
  14. DNS (Domain Name System)
  15. VPN (Virtual Private Network)
  16. Antivirus
  17. Cyber Hygiene
  18. Zero Trust
  19. Server
  20. Network Cable
  21. Port Number
  22. Ethernet
  23. Backup
  24. Digital Footprint
  25. Password
  26. Client
  27. Proxy
  28. Switch
  29. Strong Password
  30. Social Engineering
  31. Phishing
  32. Update / Patch
  33. Multi-Factor Authentication (MFA)
  34. IP Address
  35. Two-Factor Auth
  36. Firewall
  37. Ethical Hacker
  38. Wi-Fi
  39. Command Line
  40. Firewall Rule