Show phonesecurity withlockedscreenName acybersecuritythreatParticipatein "CyberMovieMontage"Report asecurityviolationDefinePhishingCompleteCrosswordPuzzleDefinecomputervirusParticipatein Doc.Lunch"Report asuspiciousemailProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletParticipatein"CaptionThis"AnswersecurityquestionEmailPASecurityName afamouscybersecurity spyGive anexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeDefineComputerVirusName acybersecuritythreatProvide inputfor futuresecuritytrainingShow yoursocial mediaaccount isprivacyprotectedAsk FSO acybersecurityrelatedquestionDefinePhishingAnswerSecurityQuestionShow phonesecurity withlockedscreenName acybersecuritythreatParticipatein "CyberMovieMontage"Report asecurityviolationDefinePhishingCompleteCrosswordPuzzleDefinecomputervirusParticipatein Doc.Lunch"Report asuspiciousemailProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletParticipatein"CaptionThis"AnswersecurityquestionEmailPASecurityName afamouscybersecurity spyGive anexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeDefineComputerVirusName acybersecuritythreatProvide inputfor futuresecuritytrainingShow yoursocial mediaaccount isprivacyprotectedAsk FSO acybersecurityrelatedquestionDefinePhishingAnswerSecurityQuestion

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Show phone security with locked screen
  2. Name a cyber security threat
  3. Participate in "Cyber Movie Montage"
  4. Report a security violation
  5. Define Phishing
  6. Complete Crossword Puzzle
  7. Define computer virus
  8. Participate in Doc. Lunch"
  9. Report a suspicious email
  10. Provide input for future security training
  11. Read Cyber Security DSS Pamphlet
  12. Participate in "Caption This"
  13. Answer security question
  14. Email PA Security
  15. Name a famous cyber security spy
  16. Give an example of a secure computer password
  17. Be caught by security properly wearing ID badge
  18. Define Computer Virus
  19. Name a cyber security threat
  20. Provide input for future security training
  21. Show your social media account is privacy protected
  22. Ask FSO a cyber security related question
  23. Define Phishing
  24. Answer Security Question