Microsoft365Internetserviceprovider(ISP)ResponsibilityFirewallIntrusionpreventionsystem(IPS)RiskVulnerabilityRouterInternetThreatPasswordWebsiteMalwareEmailSecurityVerifyIdentifyVishingDMZPIIPhishingSuspiciousCertificateLoginVirtualprivatenetwork(VPN)MaliciousDataBreachOneDrive2FA (Twofactorauthentication)PersonalServerDecryptionProtectedWi-FiClickCloudMaliciousInformationEncryptionIntrusiondetectionsystem(IDS)SharePointAuthenticationUsernameEthernetCyberMicrosoft365Internetserviceprovider(ISP)ResponsibilityFirewallIntrusionpreventionsystem(IPS)RiskVulnerabilityRouterInternetThreatPasswordWebsiteMalwareEmailSecurityVerifyIdentifyVishingDMZPIIPhishingSuspiciousCertificateLoginVirtualprivatenetwork(VPN)MaliciousDataBreachOneDrive2FA (Twofactorauthentication)PersonalServerDecryptionProtectedWi-FiClickCloudMaliciousInformationEncryptionIntrusiondetectionsystem(IDS)SharePointAuthenticationUsernameEthernetCyber

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  1. Microsoft 365
  2. Internet service provider (ISP)
  3. Responsibility
  4. Firewall
  5. Intrusion prevention system (IPS)
  6. Risk
  7. Vulnerability
  8. Router
  9. Internet
  10. Threat
  11. Password
  12. Website
  13. Malware
  14. Email
  15. Security
  16. Verify
  17. Identify
  18. Vishing
  19. DMZ
  20. PII
  21. Phishing
  22. Suspicious
  23. Certificate
  24. Login
  25. Virtual private network (VPN)
  26. Malicious
  27. Data Breach
  28. OneDrive
  29. 2FA (Two factor authentication)
  30. Personal
  31. Server
  32. Decryption
  33. Protected
  34. Wi-Fi
  35. Click
  36. Cloud
  37. Malicious
  38. Information
  39. Encryption
  40. Intrusion detection system (IDS)
  41. SharePoint
  42. Authentication
  43. Username
  44. Ethernet
  45. Cyber