OneDriveEthernet2FA (Twofactorauthentication)MaliciousDataBreachEmailCyberPhishingVirtualprivatenetwork(VPN)PersonalUsernameIntrusiondetectionsystem(IDS)IdentifyEncryptionSharePointRiskSuspiciousLoginInternetVulnerabilityRouterSecurityDecryptionPasswordMicrosoft365AuthenticationResponsibilityIntrusionpreventionsystem(IPS)Wi-FiThreatCertificateFirewallWebsitePIIInternetserviceprovider(ISP)VishingServerDMZMalwareOneDriveEthernet2FA (Twofactorauthentication)MaliciousDataBreachEmailCyberPhishingVirtualprivatenetwork(VPN)PersonalUsernameIntrusiondetectionsystem(IDS)IdentifyEncryptionSharePointRiskSuspiciousLoginInternetVulnerabilityRouterSecurityDecryptionPasswordMicrosoft365AuthenticationResponsibilityIntrusionpreventionsystem(IPS)Wi-FiThreatCertificateFirewallWebsitePIIInternetserviceprovider(ISP)VishingServerDMZMalware

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. OneDrive
  2. Ethernet
  3. 2FA (Two factor authentication)
  4. Malicious
  5. Data Breach
  6. Email
  7. Cyber
  8. Phishing
  9. Virtual private network (VPN)
  10. Personal
  11. Username
  12. Intrusion detection system (IDS)
  13. Identify
  14. Encryption
  15. SharePoint
  16. Risk
  17. Suspicious
  18. Login
  19. Internet
  20. Vulnerability
  21. Router
  22. Security
  23. Decryption
  24. Password
  25. Microsoft 365
  26. Authentication
  27. Responsibility
  28. Intrusion prevention system (IPS)
  29. Wi-Fi
  30. Threat
  31. Certificate
  32. Firewall
  33. Website
  34. PII
  35. Internet service provider (ISP)
  36. Vishing
  37. Server
  38. DMZ
  39. Malware