Personal Internet service provider (ISP) Responsibility Vishing Server Login Identify Suspicious Threat PII Cyber Ethernet DMZ Certificate Password Decryption Email Malicious Malware Router SharePoint Risk Phishing Data Breach Website Security 2FA (Two factor authentication) Virtual private network (VPN) Username Vulnerability Intrusion prevention system (IPS) OneDrive Intrusion detection system (IDS) Internet Authentication Wi- Fi Microsoft 365 Firewall Encryption Personal Internet service provider (ISP) Responsibility Vishing Server Login Identify Suspicious Threat PII Cyber Ethernet DMZ Certificate Password Decryption Email Malicious Malware Router SharePoint Risk Phishing Data Breach Website Security 2FA (Two factor authentication) Virtual private network (VPN) Username Vulnerability Intrusion prevention system (IPS) OneDrive Intrusion detection system (IDS) Internet Authentication Wi- Fi Microsoft 365 Firewall Encryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Personal
Internet service provider (ISP)
Responsibility
Vishing
Server
Login
Identify
Suspicious
Threat
PII
Cyber
Ethernet
DMZ
Certificate
Password
Decryption
Email
Malicious
Malware
Router
SharePoint
Risk
Phishing
Data Breach
Website
Security
2FA (Two factor authentication)
Virtual private network (VPN)
Username
Vulnerability
Intrusion prevention system (IPS)
OneDrive
Intrusion detection system (IDS)
Internet
Authentication
Wi-Fi
Microsoft 365
Firewall
Encryption