PII Firewall Cyber Malware Identify Internet service provider (ISP) SharePoint Decryption Email Login Password Responsibility Authentication OneDrive Security Threat Malicious Data Breach Suspicious Wi- Fi Internet Ethernet Intrusion detection system (IDS) Router Vulnerability Microsoft 365 Encryption 2FA (Two factor authentication) Server Certificate Verify Personal Virtual private network (VPN) DMZ Information Malicious Cloud Username Risk Click Intrusion prevention system (IPS) Phishing Protected Website Vishing PII Firewall Cyber Malware Identify Internet service provider (ISP) SharePoint Decryption Email Login Password Responsibility Authentication OneDrive Security Threat Malicious Data Breach Suspicious Wi- Fi Internet Ethernet Intrusion detection system (IDS) Router Vulnerability Microsoft 365 Encryption 2FA (Two factor authentication) Server Certificate Verify Personal Virtual private network (VPN) DMZ Information Malicious Cloud Username Risk Click Intrusion prevention system (IPS) Phishing Protected Website Vishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PII
Firewall
Cyber
Malware
Identify
Internet service provider (ISP)
SharePoint
Decryption
Email
Login
Password
Responsibility
Authentication
OneDrive
Security
Threat
Malicious
Data Breach
Suspicious
Wi-Fi
Internet
Ethernet
Intrusion detection system (IDS)
Router
Vulnerability
Microsoft 365
Encryption
2FA (Two factor authentication)
Server
Certificate
Verify
Personal
Virtual private network (VPN)
DMZ
Information
Malicious
Cloud
Username
Risk
Click
Intrusion prevention system (IPS)
Phishing
Protected
Website
Vishing