Microsoft365CyberLoginPersonalVulnerabilityVirtualprivatenetwork(VPN)WebsiteSecurityDecryptionIntrusiondetectionsystem(IDS)FirewallMalwareEmailUsernameVishingIdentifyVerifyResponsibilityPIIWi-FiIntrusionpreventionsystem(IPS)InternetDataBreachEncryptionSuspiciousOneDriveInformationEthernetRiskRouterSharePointCertificateServerPhishing2FA (Twofactorauthentication)PasswordInternetserviceprovider(ISP)DMZCloudThreatClickMaliciousProtectedAuthenticationMicrosoft365CyberLoginPersonalVulnerabilityVirtualprivatenetwork(VPN)WebsiteSecurityDecryptionIntrusiondetectionsystem(IDS)FirewallMalwareEmailUsernameVishingIdentifyVerifyResponsibilityPIIWi-FiIntrusionpreventionsystem(IPS)InternetDataBreachEncryptionSuspiciousOneDriveInformationEthernetRiskRouterSharePointCertificateServerPhishing2FA (Twofactorauthentication)PasswordInternetserviceprovider(ISP)DMZCloudThreatClickMaliciousProtectedAuthentication

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Microsoft 365
  2. Cyber
  3. Login
  4. Personal
  5. Vulnerability
  6. Virtual private network (VPN)
  7. Website
  8. Security
  9. Decryption
  10. Intrusion detection system (IDS)
  11. Firewall
  12. Malware
  13. Email
  14. Username
  15. Vishing
  16. Identify
  17. Verify
  18. Responsibility
  19. PII
  20. Wi-Fi
  21. Intrusion prevention system (IPS)
  22. Internet
  23. Data Breach
  24. Encryption
  25. Suspicious
  26. OneDrive
  27. Information
  28. Ethernet
  29. Risk
  30. Router
  31. SharePoint
  32. Certificate
  33. Server
  34. Phishing
  35. 2FA (Two factor authentication)
  36. Password
  37. Internet service provider (ISP)
  38. DMZ
  39. Cloud
  40. Threat
  41. Click
  42. Malicious
  43. Protected
  44. Authentication