Identify Protected TLS 1.2 Intrusion prevention system (IPS) Threat Security Intranet Internet Risk Encryption Suspicious Vulnerability Malicious Information SharePoint Malware Personal Device Internet service provider (ISP) OneDrive Data Breach Certificate Server Phishing Virtual private network (VPN) Decryption Wi- Fi Authentication Cyber Firewall Vishing Email DMZ Router 2FA (Two factor authentication) PHI Username PII Intrusion detection system (IDS) Click Verify Responsibility Login Ethernet Website Password Identify Protected TLS 1.2 Intrusion prevention system (IPS) Threat Security Intranet Internet Risk Encryption Suspicious Vulnerability Malicious Information SharePoint Malware Personal Device Internet service provider (ISP) OneDrive Data Breach Certificate Server Phishing Virtual private network (VPN) Decryption Wi- Fi Authentication Cyber Firewall Vishing Email DMZ Router 2FA (Two factor authentication) PHI Username PII Intrusion detection system (IDS) Click Verify Responsibility Login Ethernet Website Password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Identify
Protected
TLS 1.2
Intrusion prevention system (IPS)
Threat
Security
Intranet
Internet
Risk
Encryption
Suspicious
Vulnerability
Malicious
Information
SharePoint
Malware
Personal
Device
Internet service provider (ISP)
OneDrive
Data Breach
Certificate
Server
Phishing
Virtual private network (VPN)
Decryption
Wi-Fi
Authentication
Cyber
Firewall
Vishing
Email
DMZ
Router
2FA (Two factor authentication)
PHI
Username
PII
Intrusion detection system (IDS)
Click
Verify
Responsibility
Login
Ethernet
Website
Password