Protected Router Responsibility Server Malicious Ethernet Information Vulnerability Intrusion prevention system (IPS) Firewall Identify Verify Internet PII 2FA (Two factor authentication) Vishing Username Password DMZ Intrusion detection system (IDS) Certificate OneDrive Risk Data Breach Virtual private network (VPN) Suspicious Email Cloud Wi- Fi Malware Click SharePoint Cyber Security Encryption Microsoft 365 Decryption Website Threat Login Internet service provider (ISP) Phishing Authentication Personal Protected Router Responsibility Server Malicious Ethernet Information Vulnerability Intrusion prevention system (IPS) Firewall Identify Verify Internet PII 2FA (Two factor authentication) Vishing Username Password DMZ Intrusion detection system (IDS) Certificate OneDrive Risk Data Breach Virtual private network (VPN) Suspicious Email Cloud Wi- Fi Malware Click SharePoint Cyber Security Encryption Microsoft 365 Decryption Website Threat Login Internet service provider (ISP) Phishing Authentication Personal
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Protected
Router
Responsibility
Server
Malicious
Ethernet
Information
Vulnerability
Intrusion prevention system (IPS)
Firewall
Identify
Verify
Internet
PII
2FA (Two factor authentication)
Vishing
Username
Password
DMZ
Intrusion detection system (IDS)
Certificate
OneDrive
Risk
Data Breach
Virtual private network (VPN)
Suspicious
Email
Cloud
Wi-Fi
Malware
Click
SharePoint
Cyber
Security
Encryption
Microsoft 365
Decryption
Website
Threat
Login
Internet service provider (ISP)
Phishing
Authentication
Personal