InternetVishingAuthenticationSuspiciousSharePoint2FA (Twofactorauthentication)Internetserviceprovider(ISP)IdentifyPhishingRiskMicrosoft365LoginIntrusionpreventionsystem(IPS)MalwareDMZCyberWebsiteEthernetPersonalCertificateDataBreachWi-FiThreatIntrusiondetectionsystem(IDS)EmailFirewallVulnerabilityPasswordVirtualprivatenetwork(VPN)UsernameSecurityDecryptionServerOneDriveResponsibilityPIIMaliciousEncryptionRouterInternetVishingAuthenticationSuspiciousSharePoint2FA (Twofactorauthentication)Internetserviceprovider(ISP)IdentifyPhishingRiskMicrosoft365LoginIntrusionpreventionsystem(IPS)MalwareDMZCyberWebsiteEthernetPersonalCertificateDataBreachWi-FiThreatIntrusiondetectionsystem(IDS)EmailFirewallVulnerabilityPasswordVirtualprivatenetwork(VPN)UsernameSecurityDecryptionServerOneDriveResponsibilityPIIMaliciousEncryptionRouter

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  1. Internet
  2. Vishing
  3. Authentication
  4. Suspicious
  5. SharePoint
  6. 2FA (Two factor authentication)
  7. Internet service provider (ISP)
  8. Identify
  9. Phishing
  10. Risk
  11. Microsoft 365
  12. Login
  13. Intrusion prevention system (IPS)
  14. Malware
  15. DMZ
  16. Cyber
  17. Website
  18. Ethernet
  19. Personal
  20. Certificate
  21. Data Breach
  22. Wi-Fi
  23. Threat
  24. Intrusion detection system (IDS)
  25. Email
  26. Firewall
  27. Vulnerability
  28. Password
  29. Virtual private network (VPN)
  30. Username
  31. Security
  32. Decryption
  33. Server
  34. OneDrive
  35. Responsibility
  36. PII
  37. Malicious
  38. Encryption
  39. Router