Report asuspiciousemailParticipatein "CyberMovieMontage"Ask FSO acybersecurityrelatedquestionDefinePhishingAnswerSecurityQuestionCompleteCrosswordPuzzleName acybersecuritythreatShow phonesecurity withlockedscreenProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletEmailPASecurityName afamouscybersecurity spyReport asecurityviolationProvide inputfor futuresecuritytrainingShow yoursocial mediaaccount isprivacyprotectedDefinecomputervirusGive anexample of asecurecomputerpasswordAnswersecurityquestionBe caught bysecurityproperlywearing IDbadgeDefineComputerVirusName acybersecuritythreatParticipatein Doc.Lunch"DefinePhishingParticipatein"CaptionThis"Report asuspiciousemailParticipatein "CyberMovieMontage"Ask FSO acybersecurityrelatedquestionDefinePhishingAnswerSecurityQuestionCompleteCrosswordPuzzleName acybersecuritythreatShow phonesecurity withlockedscreenProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletEmailPASecurityName afamouscybersecurity spyReport asecurityviolationProvide inputfor futuresecuritytrainingShow yoursocial mediaaccount isprivacyprotectedDefinecomputervirusGive anexample of asecurecomputerpasswordAnswersecurityquestionBe caught bysecurityproperlywearing IDbadgeDefineComputerVirusName acybersecuritythreatParticipatein Doc.Lunch"DefinePhishingParticipatein"CaptionThis"

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Report a suspicious email
  2. Participate in "Cyber Movie Montage"
  3. Ask FSO a cyber security related question
  4. Define Phishing
  5. Answer Security Question
  6. Complete Crossword Puzzle
  7. Name a cyber security threat
  8. Show phone security with locked screen
  9. Provide input for future security training
  10. Read Cyber Security DSS Pamphlet
  11. Email PA Security
  12. Name a famous cyber security spy
  13. Report a security violation
  14. Provide input for future security training
  15. Show your social media account is privacy protected
  16. Define computer virus
  17. Give an example of a secure computer password
  18. Answer security question
  19. Be caught by security properly wearing ID badge
  20. Define Computer Virus
  21. Name a cyber security threat
  22. Participate in Doc. Lunch"
  23. Define Phishing
  24. Participate in "Caption This"