ZeroTrustMulti-FactorAuthentication(MFA)MalwareInsiderThreatFirewallRuleDNS(DomainNameSystem)IPAddressVPN(VirtualPrivateNetwork)PingCommandLineStrongPasswordPortNumberFirewallRouterAntivirusCloudWi-FiProxyTwo-FactorAuthLAN(LocalAreaNetwork)BackupWAN(WideAreaNetwork)ClientDataBreachPacketPhishingSocialEngineeringEthernetServerTrojanHorsePasswordDigitalFootprintEncryptionOperatingSystemCyberHygieneUpdate/ PatchEthicalHackerSwitchRansomwareNetworkCableZeroTrustMulti-FactorAuthentication(MFA)MalwareInsiderThreatFirewallRuleDNS(DomainNameSystem)IPAddressVPN(VirtualPrivateNetwork)PingCommandLineStrongPasswordPortNumberFirewallRouterAntivirusCloudWi-FiProxyTwo-FactorAuthLAN(LocalAreaNetwork)BackupWAN(WideAreaNetwork)ClientDataBreachPacketPhishingSocialEngineeringEthernetServerTrojanHorsePasswordDigitalFootprintEncryptionOperatingSystemCyberHygieneUpdate/ PatchEthicalHackerSwitchRansomwareNetworkCable

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Zero Trust
  2. Multi-Factor Authentication (MFA)
  3. Malware
  4. Insider Threat
  5. Firewall Rule
  6. DNS (Domain Name System)
  7. IP Address
  8. VPN (Virtual Private Network)
  9. Ping
  10. Command Line
  11. Strong Password
  12. Port Number
  13. Firewall
  14. Router
  15. Antivirus
  16. Cloud
  17. Wi-Fi
  18. Proxy
  19. Two-Factor Auth
  20. LAN (Local Area Network)
  21. Backup
  22. WAN (Wide Area Network)
  23. Client
  24. Data Breach
  25. Packet
  26. Phishing
  27. Social Engineering
  28. Ethernet
  29. Server
  30. Trojan Horse
  31. Password
  32. Digital Footprint
  33. Encryption
  34. Operating System
  35. Cyber Hygiene
  36. Update / Patch
  37. Ethical Hacker
  38. Switch
  39. Ransomware
  40. Network Cable