Information Malware Website Username Email Firewall Phishing Router Ethernet Internet Security Cyber Threat Virtual private network (VPN) Microsoft 365 2FA (Two factor authentication) Intrusion prevention system (IPS) Cloud Decryption Risk Protected Click PII OneDrive Wi- Fi Intrusion detection system (IDS) Responsibility Vishing Vulnerability Malicious DMZ Encryption Authentication Data Breach SharePoint Suspicious Login Certificate Personal Password Identify Internet service provider (ISP) Server Verify Malicious Information Malware Website Username Email Firewall Phishing Router Ethernet Internet Security Cyber Threat Virtual private network (VPN) Microsoft 365 2FA (Two factor authentication) Intrusion prevention system (IPS) Cloud Decryption Risk Protected Click PII OneDrive Wi- Fi Intrusion detection system (IDS) Responsibility Vishing Vulnerability Malicious DMZ Encryption Authentication Data Breach SharePoint Suspicious Login Certificate Personal Password Identify Internet service provider (ISP) Server Verify Malicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Information
Malware
Website
Username
Email
Firewall
Phishing
Router
Ethernet
Internet
Security
Cyber
Threat
Virtual private network (VPN)
Microsoft 365
2FA (Two factor authentication)
Intrusion prevention system (IPS)
Cloud
Decryption
Risk
Protected
Click
PII
OneDrive
Wi-Fi
Intrusion detection system (IDS)
Responsibility
Vishing
Vulnerability
Malicious
DMZ
Encryption
Authentication
Data Breach
SharePoint
Suspicious
Login
Certificate
Personal
Password
Identify
Internet service provider (ISP)
Server
Verify
Malicious