Threat Vishing Click Website Data Breach Device Router Internet OneDrive Information Responsibility Server PHI Email 2FA (Two factor authentication) Certificate Protected Identify DMZ Wi- Fi Decryption Login Authentication Malicious PII Intranet Firewall Virtual private network (VPN) TLS 1.2 Username Encryption Security Verify Suspicious Intrusion detection system (IDS) Risk Intrusion prevention system (IPS) Personal Ethernet Malware Cyber Internet service provider (ISP) Phishing SharePoint Vulnerability Password Threat Vishing Click Website Data Breach Device Router Internet OneDrive Information Responsibility Server PHI Email 2FA (Two factor authentication) Certificate Protected Identify DMZ Wi- Fi Decryption Login Authentication Malicious PII Intranet Firewall Virtual private network (VPN) TLS 1.2 Username Encryption Security Verify Suspicious Intrusion detection system (IDS) Risk Intrusion prevention system (IPS) Personal Ethernet Malware Cyber Internet service provider (ISP) Phishing SharePoint Vulnerability Password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Threat
Vishing
Click
Website
Data Breach
Device
Router
Internet
OneDrive
Information
Responsibility
Server
PHI
Email
2FA (Two factor authentication)
Certificate
Protected
Identify
DMZ
Wi-Fi
Decryption
Login
Authentication
Malicious
PII
Intranet
Firewall
Virtual private network (VPN)
TLS 1.2
Username
Encryption
Security
Verify
Suspicious
Intrusion detection system (IDS)
Risk
Intrusion prevention system (IPS)
Personal
Ethernet
Malware
Cyber
Internet service provider (ISP)
Phishing
SharePoint
Vulnerability
Password