Vulnerability Vishing Phishing OneDrive Server Firewall Certificate Intrusion detection system (IDS) Information Personal Username Email Microsoft 365 Click Encryption Cyber Threat Protected Identify Decryption PII Virtual private network (VPN) Responsibility Password Verify Authentication Risk Ethernet 2FA (Two factor authentication) Intrusion prevention system (IPS) Suspicious Malicious Data Breach Router Internet service provider (ISP) SharePoint Malicious Login Cloud Security DMZ Website Malware Internet Wi- Fi Vulnerability Vishing Phishing OneDrive Server Firewall Certificate Intrusion detection system (IDS) Information Personal Username Email Microsoft 365 Click Encryption Cyber Threat Protected Identify Decryption PII Virtual private network (VPN) Responsibility Password Verify Authentication Risk Ethernet 2FA (Two factor authentication) Intrusion prevention system (IPS) Suspicious Malicious Data Breach Router Internet service provider (ISP) SharePoint Malicious Login Cloud Security DMZ Website Malware Internet Wi- Fi
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vulnerability
Vishing
Phishing
OneDrive
Server
Firewall
Certificate
Intrusion detection system (IDS)
Information
Personal
Username
Email
Microsoft 365
Click
Encryption
Cyber
Threat
Protected
Identify
Decryption
PII
Virtual private network (VPN)
Responsibility
Password
Verify
Authentication
Risk
Ethernet
2FA (Two factor authentication)
Intrusion prevention system (IPS)
Suspicious
Malicious
Data Breach
Router
Internet service provider (ISP)
SharePoint
Malicious
Login
Cloud
Security
DMZ
Website
Malware
Internet
Wi-Fi