ServerVishingVerifyLoginVulnerabilityPIIRiskWi-FiPhishingMalwareCyberMaliciousSharePointMaliciousDataBreachDecryptionPersonalInformationClickSuspiciousWebsiteInternetThreatSecurityEncryptionEmailInternetserviceprovider(ISP)ProtectedRouterOneDriveIntrusiondetectionsystem(IDS)FirewallEthernet2FA (Twofactorauthentication)Microsoft365AuthenticationDMZCloudIntrusionpreventionsystem(IPS)Virtualprivatenetwork(VPN)ResponsibilityCertificatePasswordUsernameIdentifyServerVishingVerifyLoginVulnerabilityPIIRiskWi-FiPhishingMalwareCyberMaliciousSharePointMaliciousDataBreachDecryptionPersonalInformationClickSuspiciousWebsiteInternetThreatSecurityEncryptionEmailInternetserviceprovider(ISP)ProtectedRouterOneDriveIntrusiondetectionsystem(IDS)FirewallEthernet2FA (Twofactorauthentication)Microsoft365AuthenticationDMZCloudIntrusionpreventionsystem(IPS)Virtualprivatenetwork(VPN)ResponsibilityCertificatePasswordUsernameIdentify

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Server
  2. Vishing
  3. Verify
  4. Login
  5. Vulnerability
  6. PII
  7. Risk
  8. Wi-Fi
  9. Phishing
  10. Malware
  11. Cyber
  12. Malicious
  13. SharePoint
  14. Malicious
  15. Data Breach
  16. Decryption
  17. Personal
  18. Information
  19. Click
  20. Suspicious
  21. Website
  22. Internet
  23. Threat
  24. Security
  25. Encryption
  26. Email
  27. Internet service provider (ISP)
  28. Protected
  29. Router
  30. OneDrive
  31. Intrusion detection system (IDS)
  32. Firewall
  33. Ethernet
  34. 2FA (Two factor authentication)
  35. Microsoft 365
  36. Authentication
  37. DMZ
  38. Cloud
  39. Intrusion prevention system (IPS)
  40. Virtual private network (VPN)
  41. Responsibility
  42. Certificate
  43. Password
  44. Username
  45. Identify