DMZ Identify Website Login Authentication Microsoft 365 Cyber Responsibility Server Email Malicious PII Password Vishing Ethernet Threat Certificate Personal Risk Virtual private network (VPN) Data Breach Intrusion prevention system (IPS) Security Firewall OneDrive Suspicious Malware SharePoint Intrusion detection system (IDS) Internet service provider (ISP) Username Internet Encryption 2FA (Two factor authentication) Decryption Phishing Vulnerability Wi- Fi Router DMZ Identify Website Login Authentication Microsoft 365 Cyber Responsibility Server Email Malicious PII Password Vishing Ethernet Threat Certificate Personal Risk Virtual private network (VPN) Data Breach Intrusion prevention system (IPS) Security Firewall OneDrive Suspicious Malware SharePoint Intrusion detection system (IDS) Internet service provider (ISP) Username Internet Encryption 2FA (Two factor authentication) Decryption Phishing Vulnerability Wi- Fi Router
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
DMZ
Identify
Website
Login
Authentication
Microsoft 365
Cyber
Responsibility
Server
Email
Malicious
PII
Password
Vishing
Ethernet
Threat
Certificate
Personal
Risk
Virtual private network (VPN)
Data Breach
Intrusion prevention system (IPS)
Security
Firewall
OneDrive
Suspicious
Malware
SharePoint
Intrusion detection system (IDS)
Internet service provider (ISP)
Username
Internet
Encryption
2FA (Two factor authentication)
Decryption
Phishing
Vulnerability
Wi-Fi
Router