DNS(DomainNameSystem)BackupMulti-FactorAuthentication(MFA)PacketSwitchProxyStrongPasswordTwo-FactorAuthWi-FiCloudMalwareDigitalFootprintCommandLineEthicalHackerServerIPAddressRansomwareAntivirusDataBreachOperatingSystemEncryptionWAN(WideAreaNetwork)FirewallRuleInsiderThreatSocialEngineeringNetworkCablePasswordPhishingCyberHygieneEthernetZeroTrustRouterLAN(LocalAreaNetwork)FirewallVPN(VirtualPrivateNetwork)TrojanHorseClientPingPortNumberUpdate/ PatchDNS(DomainNameSystem)BackupMulti-FactorAuthentication(MFA)PacketSwitchProxyStrongPasswordTwo-FactorAuthWi-FiCloudMalwareDigitalFootprintCommandLineEthicalHackerServerIPAddressRansomwareAntivirusDataBreachOperatingSystemEncryptionWAN(WideAreaNetwork)FirewallRuleInsiderThreatSocialEngineeringNetworkCablePasswordPhishingCyberHygieneEthernetZeroTrustRouterLAN(LocalAreaNetwork)FirewallVPN(VirtualPrivateNetwork)TrojanHorseClientPingPortNumberUpdate/ Patch

CYBER BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. DNS (Domain Name System)
  2. Backup
  3. Multi-Factor Authentication (MFA)
  4. Packet
  5. Switch
  6. Proxy
  7. Strong Password
  8. Two-Factor Auth
  9. Wi-Fi
  10. Cloud
  11. Malware
  12. Digital Footprint
  13. Command Line
  14. Ethical Hacker
  15. Server
  16. IP Address
  17. Ransomware
  18. Antivirus
  19. Data Breach
  20. Operating System
  21. Encryption
  22. WAN (Wide Area Network)
  23. Firewall Rule
  24. Insider Threat
  25. Social Engineering
  26. Network Cable
  27. Password
  28. Phishing
  29. Cyber Hygiene
  30. Ethernet
  31. Zero Trust
  32. Router
  33. LAN (Local Area Network)
  34. Firewall
  35. VPN (Virtual Private Network)
  36. Trojan Horse
  37. Client
  38. Ping
  39. Port Number
  40. Update / Patch