Decryption Responsibility Internet service provider (ISP) 2FA (Two factor authentication) Website Server Threat SharePoint Phishing Identify Wi- Fi Username Data Breach Firewall Certificate Intrusion detection system (IDS) Microsoft 365 Internet DMZ Vulnerability Cyber Password Encryption Authentication Suspicious Risk Personal Ethernet Email Security Malicious Virtual private network (VPN) OneDrive Intrusion prevention system (IPS) Router Malware Vishing PII Login Decryption Responsibility Internet service provider (ISP) 2FA (Two factor authentication) Website Server Threat SharePoint Phishing Identify Wi- Fi Username Data Breach Firewall Certificate Intrusion detection system (IDS) Microsoft 365 Internet DMZ Vulnerability Cyber Password Encryption Authentication Suspicious Risk Personal Ethernet Email Security Malicious Virtual private network (VPN) OneDrive Intrusion prevention system (IPS) Router Malware Vishing PII Login
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Decryption
Responsibility
Internet service provider (ISP)
2FA (Two factor authentication)
Website
Server
Threat
SharePoint
Phishing
Identify
Wi-Fi
Username
Data Breach
Firewall
Certificate
Intrusion detection system (IDS)
Microsoft 365
Internet
DMZ
Vulnerability
Cyber
Password
Encryption
Authentication
Suspicious
Risk
Personal
Ethernet
Email
Security
Malicious
Virtual private network (VPN)
OneDrive
Intrusion prevention system (IPS)
Router
Malware
Vishing
PII
Login