Protected Internet Intrusion detection system (IDS) Server Login SharePoint Microsoft 365 PII Personal Authentication Decryption Password Data Breach Ethernet OneDrive Threat Website Click Phishing Security Suspicious Malware Cyber Wi- Fi Malicious Username 2FA (Two factor authentication) DMZ Firewall Intrusion prevention system (IPS) Encryption Risk Identify Cloud Vishing Email Information Router Certificate Verify Responsibility Virtual private network (VPN) Vulnerability Internet service provider (ISP) Protected Internet Intrusion detection system (IDS) Server Login SharePoint Microsoft 365 PII Personal Authentication Decryption Password Data Breach Ethernet OneDrive Threat Website Click Phishing Security Suspicious Malware Cyber Wi- Fi Malicious Username 2FA (Two factor authentication) DMZ Firewall Intrusion prevention system (IPS) Encryption Risk Identify Cloud Vishing Email Information Router Certificate Verify Responsibility Virtual private network (VPN) Vulnerability Internet service provider (ISP)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Protected
Internet
Intrusion detection system (IDS)
Server
Login
SharePoint
Microsoft 365
PII
Personal
Authentication
Decryption
Password
Data Breach
Ethernet
OneDrive
Threat
Website
Click
Phishing
Security
Suspicious
Malware
Cyber
Wi-Fi
Malicious
Username
2FA (Two factor authentication)
DMZ
Firewall
Intrusion prevention system (IPS)
Encryption
Risk
Identify
Cloud
Vishing
Email
Information
Router
Certificate
Verify
Responsibility
Virtual private network (VPN)
Vulnerability
Internet service provider (ISP)