Certificate Encryption OneDrive Router Personal Website Responsibility Intrusion prevention system (IPS) Internet Email Threat SharePoint Suspicious Firewall 2FA (Two factor authentication) Decryption Malware Virtual private network (VPN) Data Breach Malicious Server Identify Microsoft 365 Cyber Login Wi- Fi DMZ Phishing Risk Authentication Username Security Password PII Vishing Internet service provider (ISP) Intrusion detection system (IDS) Vulnerability Ethernet Certificate Encryption OneDrive Router Personal Website Responsibility Intrusion prevention system (IPS) Internet Email Threat SharePoint Suspicious Firewall 2FA (Two factor authentication) Decryption Malware Virtual private network (VPN) Data Breach Malicious Server Identify Microsoft 365 Cyber Login Wi- Fi DMZ Phishing Risk Authentication Username Security Password PII Vishing Internet service provider (ISP) Intrusion detection system (IDS) Vulnerability Ethernet
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Certificate
Encryption
OneDrive
Router
Personal
Website
Responsibility
Intrusion prevention system (IPS)
Internet
Email
Threat
SharePoint
Suspicious
Firewall
2FA (Two factor authentication)
Decryption
Malware
Virtual private network (VPN)
Data Breach
Malicious
Server
Identify
Microsoft 365
Cyber
Login
Wi-Fi
DMZ
Phishing
Risk
Authentication
Username
Security
Password
PII
Vishing
Internet service provider (ISP)
Intrusion detection system (IDS)
Vulnerability
Ethernet