Suspicious Identify Malicious OneDrive Security Login Malware Intranet Vishing Email Certificate Ethernet 2FA (Two factor authentication) Router Protected Personal Wi- Fi SharePoint Cyber Internet service provider (ISP) Device Click Phishing Risk Internet Firewall Username PII Password Threat PHI Authentication Virtual private network (VPN) Decryption DMZ Server Responsibility Intrusion detection system (IDS) TLS 1.2 Data Breach Encryption Vulnerability Verify Website Intrusion prevention system (IPS) Information Suspicious Identify Malicious OneDrive Security Login Malware Intranet Vishing Email Certificate Ethernet 2FA (Two factor authentication) Router Protected Personal Wi- Fi SharePoint Cyber Internet service provider (ISP) Device Click Phishing Risk Internet Firewall Username PII Password Threat PHI Authentication Virtual private network (VPN) Decryption DMZ Server Responsibility Intrusion detection system (IDS) TLS 1.2 Data Breach Encryption Vulnerability Verify Website Intrusion prevention system (IPS) Information
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Suspicious
Identify
Malicious
OneDrive
Security
Login
Malware
Intranet
Vishing
Email
Certificate
Ethernet
2FA (Two factor authentication)
Router
Protected
Personal
Wi-Fi
SharePoint
Cyber
Internet service provider (ISP)
Device
Click
Phishing
Risk
Internet
Firewall
Username
PII
Password
Threat
PHI
Authentication
Virtual private network (VPN)
Decryption
DMZ
Server
Responsibility
Intrusion detection system (IDS)
TLS 1.2
Data Breach
Encryption
Vulnerability
Verify
Website
Intrusion prevention system (IPS)
Information