Vishing Authentication Security OneDrive Malware Cyber Wi- Fi Password Login Identify Ethernet Website Data Breach Certificate Microsoft 365 Intrusion prevention system (IPS) Encryption Email Vulnerability Server Intrusion detection system (IDS) Internet service provider (ISP) Risk Internet Decryption Personal Suspicious Malicious Router Responsibility Username Firewall SharePoint PII Virtual private network (VPN) 2FA (Two factor authentication) Threat Phishing DMZ Vishing Authentication Security OneDrive Malware Cyber Wi- Fi Password Login Identify Ethernet Website Data Breach Certificate Microsoft 365 Intrusion prevention system (IPS) Encryption Email Vulnerability Server Intrusion detection system (IDS) Internet service provider (ISP) Risk Internet Decryption Personal Suspicious Malicious Router Responsibility Username Firewall SharePoint PII Virtual private network (VPN) 2FA (Two factor authentication) Threat Phishing DMZ
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Vishing
Authentication
Security
OneDrive
Malware
Cyber
Wi-Fi
Password
Login
Identify
Ethernet
Website
Data Breach
Certificate
Microsoft 365
Intrusion prevention system (IPS)
Encryption
Email
Vulnerability
Server
Intrusion detection system (IDS)
Internet service provider (ISP)
Risk
Internet
Decryption
Personal
Suspicious
Malicious
Router
Responsibility
Username
Firewall
SharePoint
PII
Virtual private network (VPN)
2FA (Two factor authentication)
Threat
Phishing
DMZ