Name afamouscybersecurity spyAnswersecurityquestionShow yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"DefinePhishingDefinePhishingProvide inputfor futuresecuritytrainingGive anexample of asecurecomputerpasswordAsk FSO acybersecurityrelatedquestionDefineComputerVirusProvide inputfor futuresecuritytrainingReport asuspiciousemailEmailPASecurityName acybersecuritythreatReport asecurityviolationDefinecomputervirusParticipatein "CyberMovieMontage"Participatein Doc.Lunch"Show phonesecurity withlockedscreenCompleteCrosswordPuzzleRead CyberSecurityDSSPamphletBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionName acybersecuritythreatName afamouscybersecurity spyAnswersecurityquestionShow yoursocial mediaaccount isprivacyprotectedParticipatein"CaptionThis"DefinePhishingDefinePhishingProvide inputfor futuresecuritytrainingGive anexample of asecurecomputerpasswordAsk FSO acybersecurityrelatedquestionDefineComputerVirusProvide inputfor futuresecuritytrainingReport asuspiciousemailEmailPASecurityName acybersecuritythreatReport asecurityviolationDefinecomputervirusParticipatein "CyberMovieMontage"Participatein Doc.Lunch"Show phonesecurity withlockedscreenCompleteCrosswordPuzzleRead CyberSecurityDSSPamphletBe caught bysecurityproperlywearing IDbadgeAnswerSecurityQuestionName acybersecuritythreat

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Name a famous cyber security spy
  2. Answer security question
  3. Show your social media account is privacy protected
  4. Participate in "Caption This"
  5. Define Phishing
  6. Define Phishing
  7. Provide input for future security training
  8. Give an example of a secure computer password
  9. Ask FSO a cyber security related question
  10. Define Computer Virus
  11. Provide input for future security training
  12. Report a suspicious email
  13. Email PA Security
  14. Name a cyber security threat
  15. Report a security violation
  16. Define computer virus
  17. Participate in "Cyber Movie Montage"
  18. Participate in Doc. Lunch"
  19. Show phone security with locked screen
  20. Complete Crossword Puzzle
  21. Read Cyber Security DSS Pamphlet
  22. Be caught by security properly wearing ID badge
  23. Answer Security Question
  24. Name a cyber security threat