2FA (Twofactorauthentication)FirewallEmailDataBreachCertificateUsernameIdentifyMicrosoft365EncryptionResponsibilityProtectedPIISecurityThreatEthernetVishingVerifySharePointVirtualprivatenetwork(VPN)InternetCyberPersonalRouterIntrusionpreventionsystem(IPS)InformationAuthenticationLoginSuspiciousDMZIntrusiondetectionsystem(IDS)WebsiteMalwareCloudPasswordServerInternetserviceprovider(ISP)ClickOneDrivePhishingRiskVulnerabilityWi-FiDecryptionMalicious2FA (Twofactorauthentication)FirewallEmailDataBreachCertificateUsernameIdentifyMicrosoft365EncryptionResponsibilityProtectedPIISecurityThreatEthernetVishingVerifySharePointVirtualprivatenetwork(VPN)InternetCyberPersonalRouterIntrusionpreventionsystem(IPS)InformationAuthenticationLoginSuspiciousDMZIntrusiondetectionsystem(IDS)WebsiteMalwareCloudPasswordServerInternetserviceprovider(ISP)ClickOneDrivePhishingRiskVulnerabilityWi-FiDecryptionMalicious

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. 2FA (Two factor authentication)
  2. Firewall
  3. Email
  4. Data Breach
  5. Certificate
  6. Username
  7. Identify
  8. Microsoft 365
  9. Encryption
  10. Responsibility
  11. Protected
  12. PII
  13. Security
  14. Threat
  15. Ethernet
  16. Vishing
  17. Verify
  18. SharePoint
  19. Virtual private network (VPN)
  20. Internet
  21. Cyber
  22. Personal
  23. Router
  24. Intrusion prevention system (IPS)
  25. Information
  26. Authentication
  27. Login
  28. Suspicious
  29. DMZ
  30. Intrusion detection system (IDS)
  31. Website
  32. Malware
  33. Cloud
  34. Password
  35. Server
  36. Internet service provider (ISP)
  37. Click
  38. OneDrive
  39. Phishing
  40. Risk
  41. Vulnerability
  42. Wi-Fi
  43. Decryption
  44. Malicious