DMZIdentifyWebsiteLoginAuthenticationMicrosoft365CyberResponsibilityServerEmailMaliciousPIIPasswordVishingEthernetThreatCertificatePersonalRiskVirtualprivatenetwork(VPN)DataBreachIntrusionpreventionsystem(IPS)SecurityFirewallOneDriveSuspiciousMalwareSharePointIntrusiondetectionsystem(IDS)Internetserviceprovider(ISP)UsernameInternetEncryption2FA (Twofactorauthentication)DecryptionPhishingVulnerabilityWi-FiRouterDMZIdentifyWebsiteLoginAuthenticationMicrosoft365CyberResponsibilityServerEmailMaliciousPIIPasswordVishingEthernetThreatCertificatePersonalRiskVirtualprivatenetwork(VPN)DataBreachIntrusionpreventionsystem(IPS)SecurityFirewallOneDriveSuspiciousMalwareSharePointIntrusiondetectionsystem(IDS)Internetserviceprovider(ISP)UsernameInternetEncryption2FA (Twofactorauthentication)DecryptionPhishingVulnerabilityWi-FiRouter

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. DMZ
  2. Identify
  3. Website
  4. Login
  5. Authentication
  6. Microsoft 365
  7. Cyber
  8. Responsibility
  9. Server
  10. Email
  11. Malicious
  12. PII
  13. Password
  14. Vishing
  15. Ethernet
  16. Threat
  17. Certificate
  18. Personal
  19. Risk
  20. Virtual private network (VPN)
  21. Data Breach
  22. Intrusion prevention system (IPS)
  23. Security
  24. Firewall
  25. OneDrive
  26. Suspicious
  27. Malware
  28. SharePoint
  29. Intrusion detection system (IDS)
  30. Internet service provider (ISP)
  31. Username
  32. Internet
  33. Encryption
  34. 2FA (Two factor authentication)
  35. Decryption
  36. Phishing
  37. Vulnerability
  38. Wi-Fi
  39. Router