Malicious Decryption Threat Certificate Click Data Breach Server Risk Security Identify Phishing Internet Vishing Wi- Fi Ethernet Username Cloud Malicious Encryption Microsoft 365 Personal Suspicious DMZ Information 2FA (Two factor authentication) Firewall Authentication Malware Router Virtual private network (VPN) Responsibility Internet service provider (ISP) Protected SharePoint Vulnerability Intrusion detection system (IDS) Verify Website Intrusion prevention system (IPS) Cyber Password OneDrive Email Login PII Malicious Decryption Threat Certificate Click Data Breach Server Risk Security Identify Phishing Internet Vishing Wi- Fi Ethernet Username Cloud Malicious Encryption Microsoft 365 Personal Suspicious DMZ Information 2FA (Two factor authentication) Firewall Authentication Malware Router Virtual private network (VPN) Responsibility Internet service provider (ISP) Protected SharePoint Vulnerability Intrusion detection system (IDS) Verify Website Intrusion prevention system (IPS) Cyber Password OneDrive Email Login PII
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malicious
Decryption
Threat
Certificate
Click
Data Breach
Server
Risk
Security
Identify
Phishing
Internet
Vishing
Wi-Fi
Ethernet
Username
Cloud
Malicious
Encryption
Microsoft 365
Personal
Suspicious
DMZ
Information
2FA (Two factor authentication)
Firewall
Authentication
Malware
Router
Virtual private network (VPN)
Responsibility
Internet service provider (ISP)
Protected
SharePoint
Vulnerability
Intrusion detection system (IDS)
Verify
Website
Intrusion prevention system (IPS)
Cyber
Password
OneDrive
Email
Login
PII