Intrusion detection system (IDS) Wi- Fi Cyber Virtual private network (VPN) PII Decryption Login Authentication Risk Vulnerability Identify Malicious Certificate Vishing Internet service provider (ISP) Email Internet Phishing Personal Malware Responsibility Intrusion prevention system (IPS) SharePoint Threat DMZ Ethernet OneDrive Microsoft 365 Website 2FA (Two factor authentication) Router Username Firewall Password Encryption Data Breach Security Server Suspicious Intrusion detection system (IDS) Wi- Fi Cyber Virtual private network (VPN) PII Decryption Login Authentication Risk Vulnerability Identify Malicious Certificate Vishing Internet service provider (ISP) Email Internet Phishing Personal Malware Responsibility Intrusion prevention system (IPS) SharePoint Threat DMZ Ethernet OneDrive Microsoft 365 Website 2FA (Two factor authentication) Router Username Firewall Password Encryption Data Breach Security Server Suspicious
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Intrusion detection system (IDS)
Wi-Fi
Cyber
Virtual private network (VPN)
PII
Decryption
Login
Authentication
Risk
Vulnerability
Identify
Malicious
Certificate
Vishing
Internet service provider (ISP)
Email
Internet
Phishing
Personal
Malware
Responsibility
Intrusion prevention system (IPS)
SharePoint
Threat
DMZ
Ethernet
OneDrive
Microsoft 365
Website
2FA (Two factor authentication)
Router
Username
Firewall
Password
Encryption
Data Breach
Security
Server
Suspicious