DecryptionResponsibilityInternetserviceprovider(ISP)2FA (Twofactorauthentication)WebsiteServerThreatSharePointPhishingIdentifyWi-FiUsernameDataBreachFirewallCertificateIntrusiondetectionsystem(IDS)Microsoft365InternetDMZVulnerabilityCyberPasswordEncryptionAuthenticationSuspiciousRiskPersonalEthernetEmailSecurityMaliciousVirtualprivatenetwork(VPN)OneDriveIntrusionpreventionsystem(IPS)RouterMalwareVishingPIILoginDecryptionResponsibilityInternetserviceprovider(ISP)2FA (Twofactorauthentication)WebsiteServerThreatSharePointPhishingIdentifyWi-FiUsernameDataBreachFirewallCertificateIntrusiondetectionsystem(IDS)Microsoft365InternetDMZVulnerabilityCyberPasswordEncryptionAuthenticationSuspiciousRiskPersonalEthernetEmailSecurityMaliciousVirtualprivatenetwork(VPN)OneDriveIntrusionpreventionsystem(IPS)RouterMalwareVishingPIILogin

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Decryption
  2. Responsibility
  3. Internet service provider (ISP)
  4. 2FA (Two factor authentication)
  5. Website
  6. Server
  7. Threat
  8. SharePoint
  9. Phishing
  10. Identify
  11. Wi-Fi
  12. Username
  13. Data Breach
  14. Firewall
  15. Certificate
  16. Intrusion detection system (IDS)
  17. Microsoft 365
  18. Internet
  19. DMZ
  20. Vulnerability
  21. Cyber
  22. Password
  23. Encryption
  24. Authentication
  25. Suspicious
  26. Risk
  27. Personal
  28. Ethernet
  29. Email
  30. Security
  31. Malicious
  32. Virtual private network (VPN)
  33. OneDrive
  34. Intrusion prevention system (IPS)
  35. Router
  36. Malware
  37. Vishing
  38. PII
  39. Login