Router Login Authentication Malware Threat Intrusion detection system (IDS) Verify Cloud Data Breach Internet service provider (ISP) Password SharePoint Phishing Virtual private network (VPN) Encryption Certificate Risk Malicious Vishing Email Microsoft 365 Suspicious Intrusion prevention system (IPS) Vulnerability Server Click Responsibility Decryption Information Wi- Fi Personal Protected Website Cyber Firewall Username OneDrive 2FA (Two factor authentication) DMZ Internet PII Security Ethernet Identify Router Login Authentication Malware Threat Intrusion detection system (IDS) Verify Cloud Data Breach Internet service provider (ISP) Password SharePoint Phishing Virtual private network (VPN) Encryption Certificate Risk Malicious Vishing Email Microsoft 365 Suspicious Intrusion prevention system (IPS) Vulnerability Server Click Responsibility Decryption Information Wi- Fi Personal Protected Website Cyber Firewall Username OneDrive 2FA (Two factor authentication) DMZ Internet PII Security Ethernet Identify
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Router
Login
Authentication
Malware
Threat
Intrusion detection system (IDS)
Verify
Cloud
Data Breach
Internet service provider (ISP)
Password
SharePoint
Phishing
Virtual private network (VPN)
Encryption
Certificate
Risk
Malicious
Vishing
Email
Microsoft 365
Suspicious
Intrusion prevention system (IPS)
Vulnerability
Server
Click
Responsibility
Decryption
Information
Wi-Fi
Personal
Protected
Website
Cyber
Firewall
Username
OneDrive
2FA (Two factor authentication)
DMZ
Internet
PII
Security
Ethernet
Identify