Vishing Password Identify Intrusion prevention system (IPS) Virtual private network (VPN) Wi- Fi Data Breach Security Encryption SharePoint Login Personal Phishing DMZ Server Decryption Responsibility Malware OneDrive Ethernet Suspicious Email Threat Internet Microsoft 365 PII Risk Firewall Certificate Malicious Cyber Username Intrusion detection system (IDS) Router 2FA (Two factor authentication) Internet service provider (ISP) Authentication Website Vulnerability Vishing Password Identify Intrusion prevention system (IPS) Virtual private network (VPN) Wi- Fi Data Breach Security Encryption SharePoint Login Personal Phishing DMZ Server Decryption Responsibility Malware OneDrive Ethernet Suspicious Email Threat Internet Microsoft 365 PII Risk Firewall Certificate Malicious Cyber Username Intrusion detection system (IDS) Router 2FA (Two factor authentication) Internet service provider (ISP) Authentication Website Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vishing
Password
Identify
Intrusion prevention system (IPS)
Virtual private network (VPN)
Wi-Fi
Data Breach
Security
Encryption
SharePoint
Login
Personal
Phishing
DMZ
Server
Decryption
Responsibility
Malware
OneDrive
Ethernet
Suspicious
Email
Threat
Internet
Microsoft 365
PII
Risk
Firewall
Certificate
Malicious
Cyber
Username
Intrusion detection system (IDS)
Router
2FA (Two factor authentication)
Internet service provider (ISP)
Authentication
Website
Vulnerability