Website OneDrive Risk SharePoint Username Personal Router Vulnerability Internet Verify Password Encryption Server Decryption Cloud Malicious Ethernet Certificate Responsibility Suspicious Virtual private network (VPN) Threat Click DMZ Login Data Breach Authentication Internet service provider (ISP) Firewall Cyber Microsoft 365 Protected Malware Intrusion detection system (IDS) Phishing Email Intrusion prevention system (IPS) Security PII Vishing Information Identify 2FA (Two factor authentication) Wi- Fi Website OneDrive Risk SharePoint Username Personal Router Vulnerability Internet Verify Password Encryption Server Decryption Cloud Malicious Ethernet Certificate Responsibility Suspicious Virtual private network (VPN) Threat Click DMZ Login Data Breach Authentication Internet service provider (ISP) Firewall Cyber Microsoft 365 Protected Malware Intrusion detection system (IDS) Phishing Email Intrusion prevention system (IPS) Security PII Vishing Information Identify 2FA (Two factor authentication) Wi- Fi
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Website
OneDrive
Risk
SharePoint
Username
Personal
Router
Vulnerability
Internet
Verify
Password
Encryption
Server
Decryption
Cloud
Malicious
Ethernet
Certificate
Responsibility
Suspicious
Virtual private network (VPN)
Threat
Click
DMZ
Login
Data Breach
Authentication
Internet service provider (ISP)
Firewall
Cyber
Microsoft 365
Protected
Malware
Intrusion detection system (IDS)
Phishing
Email
Intrusion prevention system (IPS)
Security
PII
Vishing
Information
Identify
2FA (Two factor authentication)
Wi-Fi