Microsoft 365 Cyber Login Personal Vulnerability Virtual private network (VPN) Website Security Decryption Intrusion detection system (IDS) Firewall Malware Email Username Vishing Identify Verify Responsibility PII Wi- Fi Intrusion prevention system (IPS) Internet Data Breach Encryption Suspicious OneDrive Information Ethernet Risk Router SharePoint Certificate Server Phishing 2FA (Two factor authentication) Password Internet service provider (ISP) DMZ Cloud Threat Click Malicious Protected Authentication Microsoft 365 Cyber Login Personal Vulnerability Virtual private network (VPN) Website Security Decryption Intrusion detection system (IDS) Firewall Malware Email Username Vishing Identify Verify Responsibility PII Wi- Fi Intrusion prevention system (IPS) Internet Data Breach Encryption Suspicious OneDrive Information Ethernet Risk Router SharePoint Certificate Server Phishing 2FA (Two factor authentication) Password Internet service provider (ISP) DMZ Cloud Threat Click Malicious Protected Authentication
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Microsoft 365
Cyber
Login
Personal
Vulnerability
Virtual private network (VPN)
Website
Security
Decryption
Intrusion detection system (IDS)
Firewall
Malware
Email
Username
Vishing
Identify
Verify
Responsibility
PII
Wi-Fi
Intrusion prevention system (IPS)
Internet
Data Breach
Encryption
Suspicious
OneDrive
Information
Ethernet
Risk
Router
SharePoint
Certificate
Server
Phishing
2FA (Two factor authentication)
Password
Internet service provider (ISP)
DMZ
Cloud
Threat
Click
Malicious
Protected
Authentication