CertificateEncryptionOneDriveRouterPersonalWebsiteResponsibilityIntrusionpreventionsystem(IPS)InternetEmailThreatSharePointSuspiciousFirewall2FA (Twofactorauthentication)DecryptionMalwareVirtualprivatenetwork(VPN)DataBreachMaliciousServerIdentifyMicrosoft365CyberLoginWi-FiDMZPhishingRiskAuthenticationUsernameSecurityPasswordPIIVishingInternetserviceprovider(ISP)Intrusiondetectionsystem(IDS)VulnerabilityEthernetCertificateEncryptionOneDriveRouterPersonalWebsiteResponsibilityIntrusionpreventionsystem(IPS)InternetEmailThreatSharePointSuspiciousFirewall2FA (Twofactorauthentication)DecryptionMalwareVirtualprivatenetwork(VPN)DataBreachMaliciousServerIdentifyMicrosoft365CyberLoginWi-FiDMZPhishingRiskAuthenticationUsernameSecurityPasswordPIIVishingInternetserviceprovider(ISP)Intrusiondetectionsystem(IDS)VulnerabilityEthernet

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Certificate
  2. Encryption
  3. OneDrive
  4. Router
  5. Personal
  6. Website
  7. Responsibility
  8. Intrusion prevention system (IPS)
  9. Internet
  10. Email
  11. Threat
  12. SharePoint
  13. Suspicious
  14. Firewall
  15. 2FA (Two factor authentication)
  16. Decryption
  17. Malware
  18. Virtual private network (VPN)
  19. Data Breach
  20. Malicious
  21. Server
  22. Identify
  23. Microsoft 365
  24. Cyber
  25. Login
  26. Wi-Fi
  27. DMZ
  28. Phishing
  29. Risk
  30. Authentication
  31. Username
  32. Security
  33. Password
  34. PII
  35. Vishing
  36. Internet service provider (ISP)
  37. Intrusion detection system (IDS)
  38. Vulnerability
  39. Ethernet