Wi-FiIntrusionpreventionsystem(IPS)VerifyDataBreachIntrusiondetectionsystem(IDS)SuspiciousIdentifyMaliciousEncryptionPasswordProtectedPIIWebsiteInternetLoginVulnerabilityRiskInternetserviceprovider(ISP)ServerMalwareDecryptionPersonalCyberMicrosoft365UsernamePhishingEmailRouterCloudResponsibilityOneDriveDMZVirtualprivatenetwork(VPN)ClickThreatFirewallCertificateSharePointAuthenticationSecurityMaliciousInformationVishingEthernet2FA (Twofactorauthentication)Wi-FiIntrusionpreventionsystem(IPS)VerifyDataBreachIntrusiondetectionsystem(IDS)SuspiciousIdentifyMaliciousEncryptionPasswordProtectedPIIWebsiteInternetLoginVulnerabilityRiskInternetserviceprovider(ISP)ServerMalwareDecryptionPersonalCyberMicrosoft365UsernamePhishingEmailRouterCloudResponsibilityOneDriveDMZVirtualprivatenetwork(VPN)ClickThreatFirewallCertificateSharePointAuthenticationSecurityMaliciousInformationVishingEthernet2FA (Twofactorauthentication)

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Wi-Fi
  2. Intrusion prevention system (IPS)
  3. Verify
  4. Data Breach
  5. Intrusion detection system (IDS)
  6. Suspicious
  7. Identify
  8. Malicious
  9. Encryption
  10. Password
  11. Protected
  12. PII
  13. Website
  14. Internet
  15. Login
  16. Vulnerability
  17. Risk
  18. Internet service provider (ISP)
  19. Server
  20. Malware
  21. Decryption
  22. Personal
  23. Cyber
  24. Microsoft 365
  25. Username
  26. Phishing
  27. Email
  28. Router
  29. Cloud
  30. Responsibility
  31. OneDrive
  32. DMZ
  33. Virtual private network (VPN)
  34. Click
  35. Threat
  36. Firewall
  37. Certificate
  38. SharePoint
  39. Authentication
  40. Security
  41. Malicious
  42. Information
  43. Vishing
  44. Ethernet
  45. 2FA (Two factor authentication)