Risk Server TLS 1.2 Email Identify Wi- Fi Security Phishing PII Protected Device Click Verify Vishing SharePoint 2FA (Two factor authentication) Firewall Cyber Virtual private network (VPN) Internet service provider (ISP) Website Decryption Intrusion prevention system (IPS) Vulnerability Ethernet Malicious Personal Data Breach Password Login Certificate Intranet Authentication Internet Threat Information Malware Suspicious PHI OneDrive Intrusion detection system (IDS) Encryption DMZ Router Responsibility Username Risk Server TLS 1.2 Email Identify Wi- Fi Security Phishing PII Protected Device Click Verify Vishing SharePoint 2FA (Two factor authentication) Firewall Cyber Virtual private network (VPN) Internet service provider (ISP) Website Decryption Intrusion prevention system (IPS) Vulnerability Ethernet Malicious Personal Data Breach Password Login Certificate Intranet Authentication Internet Threat Information Malware Suspicious PHI OneDrive Intrusion detection system (IDS) Encryption DMZ Router Responsibility Username
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Risk
Server
TLS 1.2
Email
Identify
Wi-Fi
Security
Phishing
PII
Protected
Device
Click
Verify
Vishing
SharePoint
2FA (Two factor authentication)
Firewall
Cyber
Virtual private network (VPN)
Internet service provider (ISP)
Website
Decryption
Intrusion prevention system (IPS)
Vulnerability
Ethernet
Malicious
Personal
Data Breach
Password
Login
Certificate
Intranet
Authentication
Internet
Threat
Information
Malware
Suspicious
PHI
OneDrive
Intrusion detection system (IDS)
Encryption
DMZ
Router
Responsibility
Username