AnswersecurityquestionShow phonesecurity withlockedscreenCompleteCrosswordPuzzleEmailPASecurityDefinecomputervirusReport asecurityviolationProvide inputfor futuresecuritytrainingAsk FSO acybersecurityrelatedquestionName acybersecuritythreatReport asuspiciousemailDefinePhishingParticipatein"CaptionThis"Name afamouscybersecurity spyAnswerSecurityQuestionParticipatein Doc.Lunch"Give anexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeParticipatein "CyberMovieMontage"DefineComputerVirusName acybersecuritythreatShow yoursocial mediaaccount isprivacyprotectedProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletDefinePhishingAnswersecurityquestionShow phonesecurity withlockedscreenCompleteCrosswordPuzzleEmailPASecurityDefinecomputervirusReport asecurityviolationProvide inputfor futuresecuritytrainingAsk FSO acybersecurityrelatedquestionName acybersecuritythreatReport asuspiciousemailDefinePhishingParticipatein"CaptionThis"Name afamouscybersecurity spyAnswerSecurityQuestionParticipatein Doc.Lunch"Give anexample of asecurecomputerpasswordBe caught bysecurityproperlywearing IDbadgeParticipatein "CyberMovieMontage"DefineComputerVirusName acybersecuritythreatShow yoursocial mediaaccount isprivacyprotectedProvide inputfor futuresecuritytrainingRead CyberSecurityDSSPamphletDefinePhishing

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Answer security question
  2. Show phone security with locked screen
  3. Complete Crossword Puzzle
  4. Email PA Security
  5. Define computer virus
  6. Report a security violation
  7. Provide input for future security training
  8. Ask FSO a cyber security related question
  9. Name a cyber security threat
  10. Report a suspicious email
  11. Define Phishing
  12. Participate in "Caption This"
  13. Name a famous cyber security spy
  14. Answer Security Question
  15. Participate in Doc. Lunch"
  16. Give an example of a secure computer password
  17. Be caught by security properly wearing ID badge
  18. Participate in "Cyber Movie Montage"
  19. Define Computer Virus
  20. Name a cyber security threat
  21. Show your social media account is privacy protected
  22. Provide input for future security training
  23. Read Cyber Security DSS Pamphlet
  24. Define Phishing