PII Vishing Cyber Phishing Vulnerability Password Personal Information Virtual private network (VPN) Wi- Fi Encryption Intrusion prevention system (IPS) Identify SharePoint Threat Authentication Internet Ethernet Server Malware Cloud Security Router Risk Responsibility Malicious Protected 2FA (Two factor authentication) Internet service provider (ISP) Certificate Verify DMZ OneDrive Username Email Suspicious Click Website Firewall Login Intrusion detection system (IDS) Microsoft 365 Data Breach Decryption PII Vishing Cyber Phishing Vulnerability Password Personal Information Virtual private network (VPN) Wi- Fi Encryption Intrusion prevention system (IPS) Identify SharePoint Threat Authentication Internet Ethernet Server Malware Cloud Security Router Risk Responsibility Malicious Protected 2FA (Two factor authentication) Internet service provider (ISP) Certificate Verify DMZ OneDrive Username Email Suspicious Click Website Firewall Login Intrusion detection system (IDS) Microsoft 365 Data Breach Decryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PII
Vishing
Cyber
Phishing
Vulnerability
Password
Personal
Information
Virtual private network (VPN)
Wi-Fi
Encryption
Intrusion prevention system (IPS)
Identify
SharePoint
Threat
Authentication
Internet
Ethernet
Server
Malware
Cloud
Security
Router
Risk
Responsibility
Malicious
Protected
2FA (Two factor authentication)
Internet service provider (ISP)
Certificate
Verify
DMZ
OneDrive
Username
Email
Suspicious
Click
Website
Firewall
Login
Intrusion detection system (IDS)
Microsoft 365
Data Breach
Decryption