Click Verify Malicious Protected Security information and event management (SIEM) Vulnerability Device Username Personal Router Phishing Decryption Vishing PII Responsibility Wi- Fi Risk Intrusion prevention system (IPS) Server Firewall Security DMZ Intranet Threat Website TLS 1.2 Encryption Legal Cyber Internet service provider (ISP) Internet Ethernet Login Information Authentication Work Password Certificate Virtual private network (VPN) PHI Data Breach Suspicious Identify SharePoint Outlook Disable Malware Email 2FA (Two factor authentication) Intrusion detection system (IDS) Click Verify Malicious Protected Security information and event management (SIEM) Vulnerability Device Username Personal Router Phishing Decryption Vishing PII Responsibility Wi- Fi Risk Intrusion prevention system (IPS) Server Firewall Security DMZ Intranet Threat Website TLS 1.2 Encryption Legal Cyber Internet service provider (ISP) Internet Ethernet Login Information Authentication Work Password Certificate Virtual private network (VPN) PHI Data Breach Suspicious Identify SharePoint Outlook Disable Malware Email 2FA (Two factor authentication) Intrusion detection system (IDS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Click
Verify
Malicious
Protected
Security information and event management (SIEM)
Vulnerability
Device
Username
Personal
Router
Phishing
Decryption
Vishing
PII
Responsibility
Wi-Fi
Risk
Intrusion prevention system (IPS)
Server
Firewall
Security
DMZ
Intranet
Threat
Website
TLS 1.2
Encryption
Legal
Cyber
Internet service provider (ISP)
Internet
Ethernet
Login
Information
Authentication
Work
Password
Certificate
Virtual private network (VPN)
PHI
Data Breach
Suspicious
Identify
SharePoint
Outlook
Disable
Malware
Email
2FA (Two factor authentication)
Intrusion detection system (IDS)