RouterLoginAuthenticationMalwareThreatIntrusiondetectionsystem(IDS)VerifyCloudDataBreachInternetserviceprovider(ISP)PasswordSharePointPhishingVirtualprivatenetwork(VPN)EncryptionCertificateRiskMaliciousVishingEmailMicrosoft365SuspiciousIntrusionpreventionsystem(IPS)VulnerabilityServerClickResponsibilityDecryptionInformationWi-FiPersonalProtectedWebsiteCyberFirewallUsernameOneDrive2FA (Twofactorauthentication)DMZInternetPIISecurityEthernetIdentifyRouterLoginAuthenticationMalwareThreatIntrusiondetectionsystem(IDS)VerifyCloudDataBreachInternetserviceprovider(ISP)PasswordSharePointPhishingVirtualprivatenetwork(VPN)EncryptionCertificateRiskMaliciousVishingEmailMicrosoft365SuspiciousIntrusionpreventionsystem(IPS)VulnerabilityServerClickResponsibilityDecryptionInformationWi-FiPersonalProtectedWebsiteCyberFirewallUsernameOneDrive2FA (Twofactorauthentication)DMZInternetPIISecurityEthernetIdentify

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Router
  2. Login
  3. Authentication
  4. Malware
  5. Threat
  6. Intrusion detection system (IDS)
  7. Verify
  8. Cloud
  9. Data Breach
  10. Internet service provider (ISP)
  11. Password
  12. SharePoint
  13. Phishing
  14. Virtual private network (VPN)
  15. Encryption
  16. Certificate
  17. Risk
  18. Malicious
  19. Vishing
  20. Email
  21. Microsoft 365
  22. Suspicious
  23. Intrusion prevention system (IPS)
  24. Vulnerability
  25. Server
  26. Click
  27. Responsibility
  28. Decryption
  29. Information
  30. Wi-Fi
  31. Personal
  32. Protected
  33. Website
  34. Cyber
  35. Firewall
  36. Username
  37. OneDrive
  38. 2FA (Two factor authentication)
  39. DMZ
  40. Internet
  41. PII
  42. Security
  43. Ethernet
  44. Identify