Wi- Fi Data Breach Intrusion prevention system (IPS) Internet service provider (ISP) Phishing Website Malicious Email Identify Certificate Protected Server 2FA (Two factor authentication) SharePoint Microsoft 365 Verify Authentication Firewall Router Virtual private network (VPN) Information Responsibility Vishing OneDrive Decryption Cloud Threat DMZ Internet Intrusion detection system (IDS) Login Risk PII Cyber Suspicious Ethernet Encryption Username Security Password Personal Click Vulnerability Malware Wi- Fi Data Breach Intrusion prevention system (IPS) Internet service provider (ISP) Phishing Website Malicious Email Identify Certificate Protected Server 2FA (Two factor authentication) SharePoint Microsoft 365 Verify Authentication Firewall Router Virtual private network (VPN) Information Responsibility Vishing OneDrive Decryption Cloud Threat DMZ Internet Intrusion detection system (IDS) Login Risk PII Cyber Suspicious Ethernet Encryption Username Security Password Personal Click Vulnerability Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Wi-Fi
Data Breach
Intrusion prevention system (IPS)
Internet service provider (ISP)
Phishing
Website
Malicious
Email
Identify
Certificate
Protected
Server
2FA (Two factor authentication)
SharePoint
Microsoft 365
Verify
Authentication
Firewall
Router
Virtual private network (VPN)
Information
Responsibility
Vishing
OneDrive
Decryption
Cloud
Threat
DMZ
Internet
Intrusion detection system (IDS)
Login
Risk
PII
Cyber
Suspicious
Ethernet
Encryption
Username
Security
Password
Personal
Click
Vulnerability
Malware