Malicious Username Suspicious PII Malware Ethernet Certificate Intrusion prevention system (IPS) Data Breach Virtual private network (VPN) Login DMZ SharePoint Encryption Intrusion detection system (IDS) Internet service provider (ISP) Personal Decryption Vishing Password Cyber Router 2FA (Two factor authentication) Website Vulnerability Identify Microsoft 365 Authentication Firewall Internet Wi- Fi Email OneDrive Phishing Security Responsibility Server Risk Threat Malicious Username Suspicious PII Malware Ethernet Certificate Intrusion prevention system (IPS) Data Breach Virtual private network (VPN) Login DMZ SharePoint Encryption Intrusion detection system (IDS) Internet service provider (ISP) Personal Decryption Vishing Password Cyber Router 2FA (Two factor authentication) Website Vulnerability Identify Microsoft 365 Authentication Firewall Internet Wi- Fi Email OneDrive Phishing Security Responsibility Server Risk Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Malicious
Username
Suspicious
PII
Malware
Ethernet
Certificate
Intrusion prevention system (IPS)
Data Breach
Virtual private network (VPN)
Login
DMZ
SharePoint
Encryption
Intrusion detection system (IDS)
Internet service provider (ISP)
Personal
Decryption
Vishing
Password
Cyber
Router
2FA (Two factor authentication)
Website
Vulnerability
Identify
Microsoft 365
Authentication
Firewall
Internet
Wi-Fi
Email
OneDrive
Phishing
Security
Responsibility
Server
Risk
Threat