ProtectedRouterResponsibilityServerMaliciousEthernetInformationVulnerabilityIntrusionpreventionsystem(IPS)FirewallIdentifyVerifyInternetPII2FA (Twofactorauthentication)VishingUsernamePasswordDMZIntrusiondetectionsystem(IDS)CertificateOneDriveRiskDataBreachVirtualprivatenetwork(VPN)SuspiciousEmailCloudWi-FiMalwareClickSharePointCyberSecurityEncryptionMicrosoft365DecryptionWebsiteThreatLoginInternetserviceprovider(ISP)PhishingAuthenticationPersonalProtectedRouterResponsibilityServerMaliciousEthernetInformationVulnerabilityIntrusionpreventionsystem(IPS)FirewallIdentifyVerifyInternetPII2FA (Twofactorauthentication)VishingUsernamePasswordDMZIntrusiondetectionsystem(IDS)CertificateOneDriveRiskDataBreachVirtualprivatenetwork(VPN)SuspiciousEmailCloudWi-FiMalwareClickSharePointCyberSecurityEncryptionMicrosoft365DecryptionWebsiteThreatLoginInternetserviceprovider(ISP)PhishingAuthenticationPersonal

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Protected
  2. Router
  3. Responsibility
  4. Server
  5. Malicious
  6. Ethernet
  7. Information
  8. Vulnerability
  9. Intrusion prevention system (IPS)
  10. Firewall
  11. Identify
  12. Verify
  13. Internet
  14. PII
  15. 2FA (Two factor authentication)
  16. Vishing
  17. Username
  18. Password
  19. DMZ
  20. Intrusion detection system (IDS)
  21. Certificate
  22. OneDrive
  23. Risk
  24. Data Breach
  25. Virtual private network (VPN)
  26. Suspicious
  27. Email
  28. Cloud
  29. Wi-Fi
  30. Malware
  31. Click
  32. SharePoint
  33. Cyber
  34. Security
  35. Encryption
  36. Microsoft 365
  37. Decryption
  38. Website
  39. Threat
  40. Login
  41. Internet service provider (ISP)
  42. Phishing
  43. Authentication
  44. Personal