Internet service provider (ISP) Security 2FA (Two factor authentication) Intrusion detection system (IDS) Encryption Login Router Password Threat Username Email Risk Microsoft 365 Virtual private network (VPN) Wi- Fi Phishing Internet Server OneDrive Firewall Malware Website DMZ SharePoint Data Breach Malicious Authentication Suspicious Intrusion prevention system (IPS) Responsibility Vishing Vulnerability Identify Ethernet PII Cyber Personal Decryption Certificate Internet service provider (ISP) Security 2FA (Two factor authentication) Intrusion detection system (IDS) Encryption Login Router Password Threat Username Email Risk Microsoft 365 Virtual private network (VPN) Wi- Fi Phishing Internet Server OneDrive Firewall Malware Website DMZ SharePoint Data Breach Malicious Authentication Suspicious Intrusion prevention system (IPS) Responsibility Vishing Vulnerability Identify Ethernet PII Cyber Personal Decryption Certificate
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internet service provider (ISP)
Security
2FA (Two factor authentication)
Intrusion detection system (IDS)
Encryption
Login
Router
Password
Threat
Username
Email
Risk
Microsoft 365
Virtual private network (VPN)
Wi-Fi
Phishing
Internet
Server
OneDrive
Firewall
Malware
Website
DMZ
SharePoint
Data Breach
Malicious
Authentication
Suspicious
Intrusion prevention system (IPS)
Responsibility
Vishing
Vulnerability
Identify
Ethernet
PII
Cyber
Personal
Decryption
Certificate