TLS 1.2 Router Authentication Virtual private network (VPN) Data Breach Disable Phishing Legal Firewall Mobile Security information and event management (SIEM) Security Protected DMZ Decryption Vulnerability Work Encryption Bayshore Cyber Internet service provider (ISP) Email Device Intrusion detection system (IDS) Vishing Server Intrusion prevention system (IPS) Responsibility Internet 2FA (Two factor authentication) Click Threat Wi-Fi Malware Malicious Ethernet Risk PHI Information Certificate Username Password Personal Intranet PII Login Website Suspicious Verify Identify TLS 1.2 Router Authentication Virtual private network (VPN) Data Breach Disable Phishing Legal Firewall Mobile Security information and event management (SIEM) Security Protected DMZ Decryption Vulnerability Work Encryption Bayshore Cyber Internet service provider (ISP) Email Device Intrusion detection system (IDS) Vishing Server Intrusion prevention system (IPS) Responsibility Internet 2FA (Two factor authentication) Click Threat Wi-Fi Malware Malicious Ethernet Risk PHI Information Certificate Username Password Personal Intranet PII Login Website Suspicious Verify Identify
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
TLS 1.2
Router
Authentication
Virtual private network (VPN)
Data Breach
Disable
Phishing
Legal
Firewall
Mobile
Security information and event management (SIEM)
Security
Protected
DMZ
Decryption
Vulnerability
Work
Encryption
Bayshore
Cyber
Internet service provider (ISP)
Email
Device
Intrusion detection system (IDS)
Vishing
Server
Intrusion prevention system (IPS)
Responsibility
Internet
2FA (Two factor authentication)
Click
Threat
Wi-Fi
Malware
Malicious
Ethernet
Risk
PHI
Information
Certificate
Username
Password
Personal
Intranet
PII
Login
Website
Suspicious
Verify
Identify