Server Email SharePoint PII Responsibility Phishing Internet service provider (ISP) Risk Malicious Wi- Fi Threat 2FA (Two factor authentication) Ethernet Cyber Identify Firewall Data Breach Virtual private network (VPN) Malware Username Website Security Internet Intrusion detection system (IDS) Certificate Vishing Intrusion prevention system (IPS) Router Microsoft 365 Encryption Vulnerability Login Authentication OneDrive Personal Decryption Password Suspicious DMZ Server Email SharePoint PII Responsibility Phishing Internet service provider (ISP) Risk Malicious Wi- Fi Threat 2FA (Two factor authentication) Ethernet Cyber Identify Firewall Data Breach Virtual private network (VPN) Malware Username Website Security Internet Intrusion detection system (IDS) Certificate Vishing Intrusion prevention system (IPS) Router Microsoft 365 Encryption Vulnerability Login Authentication OneDrive Personal Decryption Password Suspicious DMZ
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Server
Email
SharePoint
PII
Responsibility
Phishing
Internet service provider (ISP)
Risk
Malicious
Wi-Fi
Threat
2FA (Two factor authentication)
Ethernet
Cyber
Identify
Firewall
Data Breach
Virtual private network (VPN)
Malware
Username
Website
Security
Internet
Intrusion detection system (IDS)
Certificate
Vishing
Intrusion prevention system (IPS)
Router
Microsoft 365
Encryption
Vulnerability
Login
Authentication
OneDrive
Personal
Decryption
Password
Suspicious
DMZ