Network monitoring Trojan Denial of Service (DOS) Zero- day exploit Spam Penetration testing Security breach Cyberbullying Phishing Patch Cyber intelligence Encryption MFA VPN Vulnerability PII Keylogger Security posture Backdoor Digital Certificate Cybersecurity insurance 2FA Man-in- the- middle attack Virus Cybersecurity awareness Identity theft Data Privacy Exploit Firewall Crowdstrike Hacker Rootkit Ransomware IT Security Program Incident response Password Network monitoring Trojan Denial of Service (DOS) Zero- day exploit Spam Penetration testing Security breach Cyberbullying Phishing Patch Cyber intelligence Encryption MFA VPN Vulnerability PII Keylogger Security posture Backdoor Digital Certificate Cybersecurity insurance 2FA Man-in- the- middle attack Virus Cybersecurity awareness Identity theft Data Privacy Exploit Firewall Crowdstrike Hacker Rootkit Ransomware IT Security Program Incident response Password
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Network monitoring
Trojan
Denial of Service (DOS)
Zero-day exploit
Spam
Penetration testing
Security breach
Cyberbullying
Phishing
Patch
Cyber intelligence
Encryption
MFA
VPN
Vulnerability
PII
Keylogger
Security posture
Backdoor
Digital Certificate
Cybersecurity insurance
2FA
Man-in-the-middle attack
Virus
Cybersecurity awareness
Identity theft
Data Privacy
Exploit
Firewall
Crowdstrike
Hacker
Rootkit
Ransomware
IT Security Program
Incident response
Password