Wi-FiSharePointDMZCertificateVirtualprivatenetwork(VPN)PIIEncryptionThreat2FA (Twofactorauthentication)InternetServerVulnerabilityResponsibilityIntrusionpreventionsystem(IPS)PhishingInternetserviceprovider(ISP)EmailWebsiteMicrosoft365DataBreachAuthenticationOneDriveIntrusiondetectionsystem(IDS)SuspiciousRouterFirewallLoginRiskUsernamePersonalSecurityEthernetPasswordCyberMaliciousIdentifyMalwareVishingDecryptionWi-FiSharePointDMZCertificateVirtualprivatenetwork(VPN)PIIEncryptionThreat2FA (Twofactorauthentication)InternetServerVulnerabilityResponsibilityIntrusionpreventionsystem(IPS)PhishingInternetserviceprovider(ISP)EmailWebsiteMicrosoft365DataBreachAuthenticationOneDriveIntrusiondetectionsystem(IDS)SuspiciousRouterFirewallLoginRiskUsernamePersonalSecurityEthernetPasswordCyberMaliciousIdentifyMalwareVishingDecryption

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Wi-Fi
  2. SharePoint
  3. DMZ
  4. Certificate
  5. Virtual private network (VPN)
  6. PII
  7. Encryption
  8. Threat
  9. 2FA (Two factor authentication)
  10. Internet
  11. Server
  12. Vulnerability
  13. Responsibility
  14. Intrusion prevention system (IPS)
  15. Phishing
  16. Internet service provider (ISP)
  17. Email
  18. Website
  19. Microsoft 365
  20. Data Breach
  21. Authentication
  22. OneDrive
  23. Intrusion detection system (IDS)
  24. Suspicious
  25. Router
  26. Firewall
  27. Login
  28. Risk
  29. Username
  30. Personal
  31. Security
  32. Ethernet
  33. Password
  34. Cyber
  35. Malicious
  36. Identify
  37. Malware
  38. Vishing
  39. Decryption