2FA (Two factor authentication) Firewall Email Data Breach Certificate Username Identify Microsoft 365 Encryption Responsibility Protected PII Security Threat Ethernet Vishing Verify SharePoint Virtual private network (VPN) Internet Cyber Personal Router Intrusion prevention system (IPS) Information Authentication Login Suspicious DMZ Intrusion detection system (IDS) Website Malware Cloud Password Server Internet service provider (ISP) Click OneDrive Phishing Risk Vulnerability Wi- Fi Decryption Malicious 2FA (Two factor authentication) Firewall Email Data Breach Certificate Username Identify Microsoft 365 Encryption Responsibility Protected PII Security Threat Ethernet Vishing Verify SharePoint Virtual private network (VPN) Internet Cyber Personal Router Intrusion prevention system (IPS) Information Authentication Login Suspicious DMZ Intrusion detection system (IDS) Website Malware Cloud Password Server Internet service provider (ISP) Click OneDrive Phishing Risk Vulnerability Wi- Fi Decryption Malicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
2FA (Two factor authentication)
Firewall
Email
Data Breach
Certificate
Username
Identify
Microsoft 365
Encryption
Responsibility
Protected
PII
Security
Threat
Ethernet
Vishing
Verify
SharePoint
Virtual private network (VPN)
Internet
Cyber
Personal
Router
Intrusion prevention system (IPS)
Information
Authentication
Login
Suspicious
DMZ
Intrusion detection system (IDS)
Website
Malware
Cloud
Password
Server
Internet service provider (ISP)
Click
OneDrive
Phishing
Risk
Vulnerability
Wi-Fi
Decryption
Malicious