Data Breach Router SharePoint Cyber Firewall Internet Vishing Login Risk PII OneDrive PHI Responsibility Verify Email Malicious Intrusion detection system (IDS) TLS 1.2 Personal Phishing Internet service provider (ISP) Virtual private network (VPN) DMZ Information Encryption Password Username Wi- Fi Malware Vulnerability Device Certificate Intranet Threat Identify 2FA (Two factor authentication) Decryption Security Intrusion prevention system (IPS) Click Authentication Suspicious Server Website Ethernet Protected Data Breach Router SharePoint Cyber Firewall Internet Vishing Login Risk PII OneDrive PHI Responsibility Verify Email Malicious Intrusion detection system (IDS) TLS 1.2 Personal Phishing Internet service provider (ISP) Virtual private network (VPN) DMZ Information Encryption Password Username Wi- Fi Malware Vulnerability Device Certificate Intranet Threat Identify 2FA (Two factor authentication) Decryption Security Intrusion prevention system (IPS) Click Authentication Suspicious Server Website Ethernet Protected
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
Router
SharePoint
Cyber
Firewall
Internet
Vishing
Login
Risk
PII
OneDrive
PHI
Responsibility
Verify
Email
Malicious
Intrusion detection system (IDS)
TLS 1.2
Personal
Phishing
Internet service provider (ISP)
Virtual private network (VPN)
DMZ
Information
Encryption
Password
Username
Wi-Fi
Malware
Vulnerability
Device
Certificate
Intranet
Threat
Identify
2FA (Two factor authentication)
Decryption
Security
Intrusion prevention system (IPS)
Click
Authentication
Suspicious
Server
Website
Ethernet
Protected