OneDrive Ethernet 2FA (Two factor authentication) Malicious Data Breach Email Cyber Phishing Virtual private network (VPN) Personal Username Intrusion detection system (IDS) Identify Encryption SharePoint Risk Suspicious Login Internet Vulnerability Router Security Decryption Password Microsoft 365 Authentication Responsibility Intrusion prevention system (IPS) Wi- Fi Threat Certificate Firewall Website PII Internet service provider (ISP) Vishing Server DMZ Malware OneDrive Ethernet 2FA (Two factor authentication) Malicious Data Breach Email Cyber Phishing Virtual private network (VPN) Personal Username Intrusion detection system (IDS) Identify Encryption SharePoint Risk Suspicious Login Internet Vulnerability Router Security Decryption Password Microsoft 365 Authentication Responsibility Intrusion prevention system (IPS) Wi- Fi Threat Certificate Firewall Website PII Internet service provider (ISP) Vishing Server DMZ Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
OneDrive
Ethernet
2FA (Two factor authentication)
Malicious
Data Breach
Email
Cyber
Phishing
Virtual private network (VPN)
Personal
Username
Intrusion detection system (IDS)
Identify
Encryption
SharePoint
Risk
Suspicious
Login
Internet
Vulnerability
Router
Security
Decryption
Password
Microsoft 365
Authentication
Responsibility
Intrusion prevention system (IPS)
Wi-Fi
Threat
Certificate
Firewall
Website
PII
Internet service provider (ISP)
Vishing
Server
DMZ
Malware