Decryption Encryption Wi- Fi Vishing Security Intrusion detection system (IDS) Information Malicious Data Breach Suspicious Password Internet service provider (ISP) Firewall Cyber Phishing TLS 1.2 Authentication Vulnerability Verify Server Protected Intranet Internet SharePoint Email Risk Malware Username PII Website Device OneDrive Login Threat DMZ Click 2FA (Two factor authentication) Virtual private network (VPN) Certificate Ethernet Responsibility Personal Intrusion prevention system (IPS) Identify PHI Router Decryption Encryption Wi- Fi Vishing Security Intrusion detection system (IDS) Information Malicious Data Breach Suspicious Password Internet service provider (ISP) Firewall Cyber Phishing TLS 1.2 Authentication Vulnerability Verify Server Protected Intranet Internet SharePoint Email Risk Malware Username PII Website Device OneDrive Login Threat DMZ Click 2FA (Two factor authentication) Virtual private network (VPN) Certificate Ethernet Responsibility Personal Intrusion prevention system (IPS) Identify PHI Router
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Decryption
Encryption
Wi-Fi
Vishing
Security
Intrusion detection system (IDS)
Information
Malicious
Data Breach
Suspicious
Password
Internet service provider (ISP)
Firewall
Cyber
Phishing
TLS 1.2
Authentication
Vulnerability
Verify
Server
Protected
Intranet
Internet
SharePoint
Email
Risk
Malware
Username
PII
Website
Device
OneDrive
Login
Threat
DMZ
Click
2FA (Two factor authentication)
Virtual private network (VPN)
Certificate
Ethernet
Responsibility
Personal
Intrusion prevention system (IPS)
Identify
PHI
Router