Username Router Internet PHI Decryption Verify Password Wi-Fi Ethernet Intrusion prevention system (IPS) Malicious Cyber Website Internet service provider (ISP) Phishing Login Threat Mobile TLS 1.2 Click Encryption Virtual private network (VPN) DMZ Firewall Intranet Security Email Bayshore Suspicious Server Security information and event management (SIEM) Data Breach 2FA (Two factor authentication) Certificate Authentication Work Protected Intrusion detection system (IDS) Personal Vishing PII Device Vulnerability Information Risk Responsibility Disable Malware Identify Legal Username Router Internet PHI Decryption Verify Password Wi-Fi Ethernet Intrusion prevention system (IPS) Malicious Cyber Website Internet service provider (ISP) Phishing Login Threat Mobile TLS 1.2 Click Encryption Virtual private network (VPN) DMZ Firewall Intranet Security Email Bayshore Suspicious Server Security information and event management (SIEM) Data Breach 2FA (Two factor authentication) Certificate Authentication Work Protected Intrusion detection system (IDS) Personal Vishing PII Device Vulnerability Information Risk Responsibility Disable Malware Identify Legal
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Username
Router
Internet
PHI
Decryption
Verify
Password
Wi-Fi
Ethernet
Intrusion prevention system (IPS)
Malicious
Cyber
Website
Internet service provider (ISP)
Phishing
Login
Threat
Mobile
TLS 1.2
Click
Encryption
Virtual private network (VPN)
DMZ
Firewall
Intranet
Security
Email
Bayshore
Suspicious
Server
Security information and event management (SIEM)
Data Breach
2FA (Two factor authentication)
Certificate
Authentication
Work
Protected
Intrusion detection system (IDS)
Personal
Vishing
PII
Device
Vulnerability
Information
Risk
Responsibility
Disable
Malware
Identify
Legal