Firewall Malicious Virtual private network (VPN) Email Password Responsibility PII Ethernet Identify Internet Server Risk Personal Phishing Username Certificate Malware Security Authentication Threat Login SharePoint 2FA (Two factor authentication) Cyber DMZ Vishing Website OneDrive Internet service provider (ISP) Suspicious Wi- Fi Router Decryption Data Breach Microsoft 365 Vulnerability Intrusion prevention system (IPS) Intrusion detection system (IDS) Encryption Firewall Malicious Virtual private network (VPN) Email Password Responsibility PII Ethernet Identify Internet Server Risk Personal Phishing Username Certificate Malware Security Authentication Threat Login SharePoint 2FA (Two factor authentication) Cyber DMZ Vishing Website OneDrive Internet service provider (ISP) Suspicious Wi- Fi Router Decryption Data Breach Microsoft 365 Vulnerability Intrusion prevention system (IPS) Intrusion detection system (IDS) Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Firewall
Malicious
Virtual private network (VPN)
Email
Password
Responsibility
PII
Ethernet
Identify
Internet
Server
Risk
Personal
Phishing
Username
Certificate
Malware
Security
Authentication
Threat
Login
SharePoint
2FA (Two factor authentication)
Cyber
DMZ
Vishing
Website
OneDrive
Internet service provider (ISP)
Suspicious
Wi-Fi
Router
Decryption
Data Breach
Microsoft 365
Vulnerability
Intrusion prevention system (IPS)
Intrusion detection system (IDS)
Encryption