Information Website 2FA (Two factor authentication) Encryption OneDrive Vulnerability Click Internet service provider (ISP) PII Ethernet Responsibility Malicious Server Username Wi- Fi Verify Microsoft 365 Malware Threat Intrusion prevention system (IPS) Cloud Security Firewall Authentication Phishing Router Personal Login Password Certificate DMZ Data Breach Decryption Vishing Internet Risk Cyber Email Suspicious SharePoint Virtual private network (VPN) Intrusion detection system (IDS) Malicious Protected Identify Information Website 2FA (Two factor authentication) Encryption OneDrive Vulnerability Click Internet service provider (ISP) PII Ethernet Responsibility Malicious Server Username Wi- Fi Verify Microsoft 365 Malware Threat Intrusion prevention system (IPS) Cloud Security Firewall Authentication Phishing Router Personal Login Password Certificate DMZ Data Breach Decryption Vishing Internet Risk Cyber Email Suspicious SharePoint Virtual private network (VPN) Intrusion detection system (IDS) Malicious Protected Identify
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Information
Website
2FA (Two factor authentication)
Encryption
OneDrive
Vulnerability
Click
Internet service provider (ISP)
PII
Ethernet
Responsibility
Malicious
Server
Username
Wi-Fi
Verify
Microsoft 365
Malware
Threat
Intrusion prevention system (IPS)
Cloud
Security
Firewall
Authentication
Phishing
Router
Personal
Login
Password
Certificate
DMZ
Data Breach
Decryption
Vishing
Internet
Risk
Cyber
Email
Suspicious
SharePoint
Virtual private network (VPN)
Intrusion detection system (IDS)
Malicious
Protected
Identify