SharePoint Encryption Risk Website Phishing Login Vishing Decryption OneDrive Microsoft 365 Password Firewall Intrusion detection system (IDS) Email PII Threat 2FA (Two factor authentication) Personal Security Wi- Fi Internet service provider (ISP) Suspicious Router Vulnerability Ethernet Virtual private network (VPN) Server Malware Data Breach Cyber Internet Authentication Intrusion prevention system (IPS) Malicious Identify Certificate Username DMZ Responsibility SharePoint Encryption Risk Website Phishing Login Vishing Decryption OneDrive Microsoft 365 Password Firewall Intrusion detection system (IDS) Email PII Threat 2FA (Two factor authentication) Personal Security Wi- Fi Internet service provider (ISP) Suspicious Router Vulnerability Ethernet Virtual private network (VPN) Server Malware Data Breach Cyber Internet Authentication Intrusion prevention system (IPS) Malicious Identify Certificate Username DMZ Responsibility
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SharePoint
Encryption
Risk
Website
Phishing
Login
Vishing
Decryption
OneDrive
Microsoft 365
Password
Firewall
Intrusion detection system (IDS)
Email
PII
Threat
2FA (Two factor authentication)
Personal
Security
Wi-Fi
Internet service provider (ISP)
Suspicious
Router
Vulnerability
Ethernet
Virtual private network (VPN)
Server
Malware
Data Breach
Cyber
Internet
Authentication
Intrusion prevention system (IPS)
Malicious
Identify
Certificate
Username
DMZ
Responsibility