Internet Vishing Authentication Suspicious SharePoint 2FA (Two factor authentication) Internet service provider (ISP) Identify Phishing Risk Microsoft 365 Login Intrusion prevention system (IPS) Malware DMZ Cyber Website Ethernet Personal Certificate Data Breach Wi- Fi Threat Intrusion detection system (IDS) Email Firewall Vulnerability Password Virtual private network (VPN) Username Security Decryption Server OneDrive Responsibility PII Malicious Encryption Router Internet Vishing Authentication Suspicious SharePoint 2FA (Two factor authentication) Internet service provider (ISP) Identify Phishing Risk Microsoft 365 Login Intrusion prevention system (IPS) Malware DMZ Cyber Website Ethernet Personal Certificate Data Breach Wi- Fi Threat Intrusion detection system (IDS) Email Firewall Vulnerability Password Virtual private network (VPN) Username Security Decryption Server OneDrive Responsibility PII Malicious Encryption Router
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Internet
Vishing
Authentication
Suspicious
SharePoint
2FA (Two factor authentication)
Internet service provider (ISP)
Identify
Phishing
Risk
Microsoft 365
Login
Intrusion prevention system (IPS)
Malware
DMZ
Cyber
Website
Ethernet
Personal
Certificate
Data Breach
Wi-Fi
Threat
Intrusion detection system (IDS)
Email
Firewall
Vulnerability
Password
Virtual private network (VPN)
Username
Security
Decryption
Server
OneDrive
Responsibility
PII
Malicious
Encryption
Router