Data Breach OneDrive Decryption Encryption Malicious SharePoint Threat Identify Vulnerability Username Wi- Fi Router Authentication Website Verify Malware Microsoft 365 Firewall Personal Security Ethernet Risk DMZ Suspicious Cloud Phishing Vishing Internet Internet service provider (ISP) Email Protected Password Cyber Login Intrusion prevention system (IPS) Click Server PII Virtual private network (VPN) Certificate 2FA (Two factor authentication) Responsibility Information Intrusion detection system (IDS) Data Breach OneDrive Decryption Encryption Malicious SharePoint Threat Identify Vulnerability Username Wi- Fi Router Authentication Website Verify Malware Microsoft 365 Firewall Personal Security Ethernet Risk DMZ Suspicious Cloud Phishing Vishing Internet Internet service provider (ISP) Email Protected Password Cyber Login Intrusion prevention system (IPS) Click Server PII Virtual private network (VPN) Certificate 2FA (Two factor authentication) Responsibility Information Intrusion detection system (IDS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Data Breach
OneDrive
Decryption
Encryption
Malicious
SharePoint
Threat
Identify
Vulnerability
Username
Wi-Fi
Router
Authentication
Website
Verify
Malware
Microsoft 365
Firewall
Personal
Security
Ethernet
Risk
DMZ
Suspicious
Cloud
Phishing
Vishing
Internet
Internet service provider (ISP)
Email
Protected
Password
Cyber
Login
Intrusion prevention system (IPS)
Click
Server
PII
Virtual private network (VPN)
Certificate
2FA (Two factor authentication)
Responsibility
Information
Intrusion detection system (IDS)