Wi- Fi SharePoint DMZ Certificate Virtual private network (VPN) PII Encryption Threat 2FA (Two factor authentication) Internet Server Vulnerability Responsibility Intrusion prevention system (IPS) Phishing Internet service provider (ISP) Email Website Microsoft 365 Data Breach Authentication OneDrive Intrusion detection system (IDS) Suspicious Router Firewall Login Risk Username Personal Security Ethernet Password Cyber Malicious Identify Malware Vishing Decryption Wi- Fi SharePoint DMZ Certificate Virtual private network (VPN) PII Encryption Threat 2FA (Two factor authentication) Internet Server Vulnerability Responsibility Intrusion prevention system (IPS) Phishing Internet service provider (ISP) Email Website Microsoft 365 Data Breach Authentication OneDrive Intrusion detection system (IDS) Suspicious Router Firewall Login Risk Username Personal Security Ethernet Password Cyber Malicious Identify Malware Vishing Decryption
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Wi-Fi
SharePoint
DMZ
Certificate
Virtual private network (VPN)
PII
Encryption
Threat
2FA (Two factor authentication)
Internet
Server
Vulnerability
Responsibility
Intrusion prevention system (IPS)
Phishing
Internet service provider (ISP)
Email
Website
Microsoft 365
Data Breach
Authentication
OneDrive
Intrusion detection system (IDS)
Suspicious
Router
Firewall
Login
Risk
Username
Personal
Security
Ethernet
Password
Cyber
Malicious
Identify
Malware
Vishing
Decryption