SharePointMalwarePIISuspiciousIdentifySecurityProtectedRouterVerifyMicrosoft365EncryptionOneDrive2FA (Twofactorauthentication)PersonalIntrusiondetectionsystem(IDS)Virtualprivatenetwork(VPN)InformationDecryptionWi-FiInternetEthernetInternetserviceprovider(ISP)UsernameClickVishingServerAuthenticationEmailFirewallCyberPasswordPhishingDMZLoginDataBreachVulnerabilityMaliciousIntrusionpreventionsystem(IPS)MaliciousRiskThreatWebsiteCertificateResponsibilityCloudSharePointMalwarePIISuspiciousIdentifySecurityProtectedRouterVerifyMicrosoft365EncryptionOneDrive2FA (Twofactorauthentication)PersonalIntrusiondetectionsystem(IDS)Virtualprivatenetwork(VPN)InformationDecryptionWi-FiInternetEthernetInternetserviceprovider(ISP)UsernameClickVishingServerAuthenticationEmailFirewallCyberPasswordPhishingDMZLoginDataBreachVulnerabilityMaliciousIntrusionpreventionsystem(IPS)MaliciousRiskThreatWebsiteCertificateResponsibilityCloud

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. SharePoint
  2. Malware
  3. PII
  4. Suspicious
  5. Identify
  6. Security
  7. Protected
  8. Router
  9. Verify
  10. Microsoft 365
  11. Encryption
  12. OneDrive
  13. 2FA (Two factor authentication)
  14. Personal
  15. Intrusion detection system (IDS)
  16. Virtual private network (VPN)
  17. Information
  18. Decryption
  19. Wi-Fi
  20. Internet
  21. Ethernet
  22. Internet service provider (ISP)
  23. Username
  24. Click
  25. Vishing
  26. Server
  27. Authentication
  28. Email
  29. Firewall
  30. Cyber
  31. Password
  32. Phishing
  33. DMZ
  34. Login
  35. Data Breach
  36. Vulnerability
  37. Malicious
  38. Intrusion prevention system (IPS)
  39. Malicious
  40. Risk
  41. Threat
  42. Website
  43. Certificate
  44. Responsibility
  45. Cloud