Server Vishing Verify Login Vulnerability PII Risk Wi- Fi Phishing Malware Cyber Malicious SharePoint Malicious Data Breach Decryption Personal Information Click Suspicious Website Internet Threat Security Encryption Email Internet service provider (ISP) Protected Router OneDrive Intrusion detection system (IDS) Firewall Ethernet 2FA (Two factor authentication) Microsoft 365 Authentication DMZ Cloud Intrusion prevention system (IPS) Virtual private network (VPN) Responsibility Certificate Password Username Identify Server Vishing Verify Login Vulnerability PII Risk Wi- Fi Phishing Malware Cyber Malicious SharePoint Malicious Data Breach Decryption Personal Information Click Suspicious Website Internet Threat Security Encryption Email Internet service provider (ISP) Protected Router OneDrive Intrusion detection system (IDS) Firewall Ethernet 2FA (Two factor authentication) Microsoft 365 Authentication DMZ Cloud Intrusion prevention system (IPS) Virtual private network (VPN) Responsibility Certificate Password Username Identify
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Server
Vishing
Verify
Login
Vulnerability
PII
Risk
Wi-Fi
Phishing
Malware
Cyber
Malicious
SharePoint
Malicious
Data Breach
Decryption
Personal
Information
Click
Suspicious
Website
Internet
Threat
Security
Encryption
Email
Internet service provider (ISP)
Protected
Router
OneDrive
Intrusion detection system (IDS)
Firewall
Ethernet
2FA (Two factor authentication)
Microsoft 365
Authentication
DMZ
Cloud
Intrusion prevention system (IPS)
Virtual private network (VPN)
Responsibility
Certificate
Password
Username
Identify