Digital Footprint IP Address Ethical Hacker Two- Factor Auth Insider Threat VPN (Virtual Private Network) Cyber Hygiene Operating System Social Engineering Firewall Client Proxy Multi-Factor Authentication (MFA) Wi- Fi WAN (Wide Area Network) Backup Command Line Password Port Number DNS (Domain Name System) Ping Network Cable Data Breach Trojan Horse Packet Malware Ransomware Update / Patch LAN (Local Area Network) Ethernet Firewall Rule Router Cloud Zero Trust Phishing Server Switch Antivirus Strong Password Encryption Digital Footprint IP Address Ethical Hacker Two- Factor Auth Insider Threat VPN (Virtual Private Network) Cyber Hygiene Operating System Social Engineering Firewall Client Proxy Multi-Factor Authentication (MFA) Wi- Fi WAN (Wide Area Network) Backup Command Line Password Port Number DNS (Domain Name System) Ping Network Cable Data Breach Trojan Horse Packet Malware Ransomware Update / Patch LAN (Local Area Network) Ethernet Firewall Rule Router Cloud Zero Trust Phishing Server Switch Antivirus Strong Password Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Digital Footprint
IP Address
Ethical Hacker
Two-Factor Auth
Insider Threat
VPN (Virtual Private Network)
Cyber Hygiene
Operating System
Social Engineering
Firewall
Client
Proxy
Multi-Factor Authentication (MFA)
Wi-Fi
WAN (Wide Area Network)
Backup
Command Line
Password
Port Number
DNS (Domain Name System)
Ping
Network Cable
Data Breach
Trojan Horse
Packet
Malware
Ransomware
Update / Patch
LAN (Local Area Network)
Ethernet
Firewall Rule
Router
Cloud
Zero Trust
Phishing
Server
Switch
Antivirus
Strong Password
Encryption