SharePoint Malware PII Suspicious Identify Security Protected Router Verify Microsoft 365 Encryption OneDrive 2FA (Two factor authentication) Personal Intrusion detection system (IDS) Virtual private network (VPN) Information Decryption Wi- Fi Internet Ethernet Internet service provider (ISP) Username Click Vishing Server Authentication Email Firewall Cyber Password Phishing DMZ Login Data Breach Vulnerability Malicious Intrusion prevention system (IPS) Malicious Risk Threat Website Certificate Responsibility Cloud SharePoint Malware PII Suspicious Identify Security Protected Router Verify Microsoft 365 Encryption OneDrive 2FA (Two factor authentication) Personal Intrusion detection system (IDS) Virtual private network (VPN) Information Decryption Wi- Fi Internet Ethernet Internet service provider (ISP) Username Click Vishing Server Authentication Email Firewall Cyber Password Phishing DMZ Login Data Breach Vulnerability Malicious Intrusion prevention system (IPS) Malicious Risk Threat Website Certificate Responsibility Cloud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SharePoint
Malware
PII
Suspicious
Identify
Security
Protected
Router
Verify
Microsoft 365
Encryption
OneDrive
2FA (Two factor authentication)
Personal
Intrusion detection system (IDS)
Virtual private network (VPN)
Information
Decryption
Wi-Fi
Internet
Ethernet
Internet service provider (ISP)
Username
Click
Vishing
Server
Authentication
Email
Firewall
Cyber
Password
Phishing
DMZ
Login
Data Breach
Vulnerability
Malicious
Intrusion prevention system (IPS)
Malicious
Risk
Threat
Website
Certificate
Responsibility
Cloud