Wi- Fi Intrusion prevention system (IPS) Verify Data Breach Intrusion detection system (IDS) Suspicious Identify Malicious Encryption Password Protected PII Website Internet Login Vulnerability Risk Internet service provider (ISP) Server Malware Decryption Personal Cyber Microsoft 365 Username Phishing Email Router Cloud Responsibility OneDrive DMZ Virtual private network (VPN) Click Threat Firewall Certificate SharePoint Authentication Security Malicious Information Vishing Ethernet 2FA (Two factor authentication) Wi- Fi Intrusion prevention system (IPS) Verify Data Breach Intrusion detection system (IDS) Suspicious Identify Malicious Encryption Password Protected PII Website Internet Login Vulnerability Risk Internet service provider (ISP) Server Malware Decryption Personal Cyber Microsoft 365 Username Phishing Email Router Cloud Responsibility OneDrive DMZ Virtual private network (VPN) Click Threat Firewall Certificate SharePoint Authentication Security Malicious Information Vishing Ethernet 2FA (Two factor authentication)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Wi-Fi
Intrusion prevention system (IPS)
Verify
Data Breach
Intrusion detection system (IDS)
Suspicious
Identify
Malicious
Encryption
Password
Protected
PII
Website
Internet
Login
Vulnerability
Risk
Internet service provider (ISP)
Server
Malware
Decryption
Personal
Cyber
Microsoft 365
Username
Phishing
Email
Router
Cloud
Responsibility
OneDrive
DMZ
Virtual private network (VPN)
Click
Threat
Firewall
Certificate
SharePoint
Authentication
Security
Malicious
Information
Vishing
Ethernet
2FA (Two factor authentication)