Microsoft 365 Internet service provider (ISP) Responsibility Firewall Intrusion prevention system (IPS) Risk Vulnerability Router Internet Threat Password Website Malware Email Security Verify Identify Vishing DMZ PII Phishing Suspicious Certificate Login Virtual private network (VPN) Malicious Data Breach OneDrive 2FA (Two factor authentication) Personal Server Decryption Protected Wi- Fi Click Cloud Malicious Information Encryption Intrusion detection system (IDS) SharePoint Authentication Username Ethernet Cyber Microsoft 365 Internet service provider (ISP) Responsibility Firewall Intrusion prevention system (IPS) Risk Vulnerability Router Internet Threat Password Website Malware Email Security Verify Identify Vishing DMZ PII Phishing Suspicious Certificate Login Virtual private network (VPN) Malicious Data Breach OneDrive 2FA (Two factor authentication) Personal Server Decryption Protected Wi- Fi Click Cloud Malicious Information Encryption Intrusion detection system (IDS) SharePoint Authentication Username Ethernet Cyber
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Microsoft 365
Internet service provider (ISP)
Responsibility
Firewall
Intrusion prevention system (IPS)
Risk
Vulnerability
Router
Internet
Threat
Password
Website
Malware
Email
Security
Verify
Identify
Vishing
DMZ
PII
Phishing
Suspicious
Certificate
Login
Virtual private network (VPN)
Malicious
Data Breach
OneDrive
2FA (Two factor authentication)
Personal
Server
Decryption
Protected
Wi-Fi
Click
Cloud
Malicious
Information
Encryption
Intrusion detection system (IDS)
SharePoint
Authentication
Username
Ethernet
Cyber