Certificate Responsibility PII Phishing Encryption Internet service provider (ISP) Firewall Security Data Breach Malicious Intrusion prevention system (IPS) DMZ Decryption Authentication Personal Microsoft 365 SharePoint Username Vulnerability Login Router Ethernet Wi- Fi Malware 2FA (Two factor authentication) Risk Suspicious Email OneDrive Identify Password Threat Cyber Website Server Virtual private network (VPN) Internet Vishing Intrusion detection system (IDS) Certificate Responsibility PII Phishing Encryption Internet service provider (ISP) Firewall Security Data Breach Malicious Intrusion prevention system (IPS) DMZ Decryption Authentication Personal Microsoft 365 SharePoint Username Vulnerability Login Router Ethernet Wi- Fi Malware 2FA (Two factor authentication) Risk Suspicious Email OneDrive Identify Password Threat Cyber Website Server Virtual private network (VPN) Internet Vishing Intrusion detection system (IDS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Certificate
Responsibility
PII
Phishing
Encryption
Internet service provider (ISP)
Firewall
Security
Data Breach
Malicious
Intrusion prevention system (IPS)
DMZ
Decryption
Authentication
Personal
Microsoft 365
SharePoint
Username
Vulnerability
Login
Router
Ethernet
Wi-Fi
Malware
2FA (Two factor authentication)
Risk
Suspicious
Email
OneDrive
Identify
Password
Threat
Cyber
Website
Server
Virtual private network (VPN)
Internet
Vishing
Intrusion detection system (IDS)